<nodes> <node id="68608">  <title><![CDATA[NSF Announces New Expeditions in Computing Awards]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Georgia Tech's project, led by Jim Rehg (IC) and intended to use computers to help screen more young children for autism, will help "push the frontiers of computing," according to the NSF.&nbsp;<em>Source: DrDobbs.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1309285957</created>  <gmt_created>2011-06-28 18:32:37</gmt_created>  <changed>1475893499</changed>  <gmt_changed>2016-10-08 02:24:59</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Emily Wright]]></publication>  <article_dateline>2010-08-24T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-08-24T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-08-24T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.drdobbs.com/tools/226900067;jsessionid=DK35JC2E5FPU5QE1GHOSKHWATMY32JVN?cid=RSSfeed_DDJ_DevelopmentTools]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68609">  <title><![CDATA[Researchers Developing Computerized Tool for Autism Diagnosis, Care]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>A team including Gregory Abowd (IC) is developing an autism diagnosis tool with three technological components: a "smart" video camera, timing devices to measure heart rate and other biometrics, and data evaluation software.&nbsp;<em>Source: iHealthBeat.org</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1309286293</created>  <gmt_created>2011-06-28 18:38:13</gmt_created>  <changed>1475893499</changed>  <gmt_changed>2016-10-08 02:24:59</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[cyber risk]]></publication>  <article_dateline>2010-08-24T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-08-24T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-08-24T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.ihealthbeat.org/articles/2010/8/23/researchers-developing-computerized-tool-for-autism-diagnosis-care.aspx]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68610">  <title><![CDATA[Watching the Suspicious Behavior of Spam]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>For years, network operators have fought spam by examining what messages say. Nick &shy;Feamster (CS), a member of Technology Review's TR35 for 2010, had a better idea.<em>Source: Technology Review</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1309286406</created>  <gmt_created>2011-06-28 18:40:06</gmt_created>  <changed>1475893499</changed>  <gmt_changed>2016-10-08 02:24:59</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[CREST D-Map]]></publication>  <article_dateline>2010-08-27T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-08-27T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-08-27T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.technologyreview.com/TR35/Profile.aspx?Cand=T&amp;TRID=958]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68611">  <title><![CDATA[Tweens &amp; Technology: The Tiny Power Shoppers]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Research by Ph.D. student Sarita Yardi (IC) shows that kids are adopting technology faster than ever before, fueling a consumer demographic not just on video games but mobile phones, Internet accounts and other electronic devices and services.&nbsp;<em>Source: Financial Post</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1309287431</created>  <gmt_created>2011-06-28 18:57:11</gmt_created>  <changed>1475893499</changed>  <gmt_changed>2016-10-08 02:24:59</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Tonga]]></publication>  <article_dateline>2010-08-30T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-08-30T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-08-30T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.financialpost.com/news/tiny+power+shoppers/3452047/story.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68612">  <title><![CDATA[New Research Applies Computing to Detecting Autism]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>A $10 million NSF Expeditions project, led by Jim Rehg (IC), will apply the new discipline of computational behavioral science to the task of detecting autism in very young children.<em>Source: Campus Technology</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1309287535</created>  <gmt_created>2011-06-28 18:58:55</gmt_created>  <changed>1475893499</changed>  <gmt_changed>2016-10-08 02:24:59</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[cs junior design capstone expo]]></publication>  <article_dateline>2010-09-02T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-02T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-02T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://campustechnology.com/articles/2010/09/01/new-research-applies-computing-to-detecting-autism.aspx]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68613">  <title><![CDATA[Inflated Performance?]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>“I don’t believe that the speedups people report from their GPU ports are inflated,” Rich Vuduc (CSE) said at the 2010 SciDAC conference. “However, these speedups also don’t magically occur just because you put a GPU into your system."&nbsp;<em>Source: ISGTW.org</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1309296908</created>  <gmt_created>2011-06-28 21:35:08</gmt_created>  <changed>1475893499</changed>  <gmt_changed>2016-10-08 02:24:59</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Brain Awareness Week]]></publication>  <article_dateline>2010-09-07T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-07T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-07T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.isgtw.org/?pid=1002730]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68481">  <title><![CDATA[Flash on College Websites May Pose Security Risk]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Mustaque Ahamad (CS), director of the Georgia Tech Information Security Center, says Flash software has holes that can leave websites open to cyber attack.&nbsp;<em>Source: Chronicle of Higher Education</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1308764980</created>  <gmt_created>2011-06-22 17:49:40</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[You in The News]]></publication>  <article_dateline>2010-07-13T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-07-13T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-07-13T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://chronicle.com/blogPost/Flash-on-College-Web-Sites-May/25384/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68511">  <title><![CDATA[Flexible Routing in the Cloud]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>A transit portal (TP) could help cloud-based applications route traffic much more efficiently. Ph.D. student Vytautus Valancius (CS) is leading a multi-institutional team investigating the TP option for managing network latency.&nbsp;<em>Source: Computing Now</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1308851396</created>  <gmt_created>2011-06-23 17:49:56</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Aerospace and Acoustics]]></publication>  <article_dateline>2010-08-17T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-08-17T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-08-17T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.computer.org/portal/web/computingnow/archive/news067]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68493">  <title><![CDATA[HP Bestows 3rd Annual Research Innovation Awards]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Karsten Schwan (CS), who now has received the award three years running, is one of 65 researchers from around the world to receive funding aimed at conducting breakthrough collaborative research with HP.&nbsp;<em>Source: HPCwire</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1308842734</created>  <gmt_created>2011-06-23 15:25:34</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Brett Aiello]]></publication>  <article_dateline>2010-07-13T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-07-13T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-07-13T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.hpcwire.com/industry/academia/HP-Announces-Recipients-of-Third-Annual-Innovation-Research-Awards-97948689.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68512">  <title><![CDATA[Step 1: Post Elusive Proof. Step 2: Watch Fireworks.]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Passions have run high in the online debate, argued significantly on Dick Lipton's (CS) blog, surrounding an HP researcher's 100-page "P=NP" proof. The discussion shows the Internet's value as a tool for intellectual collaboration.&nbsp;<em>Source: The New York Times</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1308851545</created>  <gmt_created>2011-06-23 17:52:25</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Extension of Self]]></publication>  <article_dateline>2010-08-17T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-08-17T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-08-17T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.nytimes.com/2010/08/17/science/17proof.html?_r=1&amp;ref=todayspaper]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68494">  <title><![CDATA[The Ongoing War Against Cybercrime]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Legislators and organizations are more aware of identity theft than ever before, but personal vigilance is still an individual's best defense against cyber criminals, says Jon Giffin (CS).&nbsp;<em>Source: CNN.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1308843682</created>  <gmt_created>2011-06-23 15:41:22</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[The Ongoing War Against Cybercrime]]></publication>  <article_dateline>2010-07-13T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-07-13T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-07-13T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.cnn.com/2010/TECH/web/07/11/protecting.personal.data/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68606">  <title><![CDATA[NSF Awards $10M to Develop Computing Techniques for Measuring and Analyzing Child Behavior]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>A Georgia Tech-led team received $10 million to develop novel computing techniques for assessing children's behavior. The technologies could enable new approaches for identifying children at risk for developmental disorders and potentially improve treatment.<em>Source: GT Research News</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1309285016</created>  <gmt_created>2011-06-28 18:16:56</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Military Family Support]]></publication>  <article_dateline>2010-08-19T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-08-19T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-08-19T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.gatech.edu/newsroom/release.html?nid=60509]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68495">  <title><![CDATA[Qualcomm Unveils AR Platform for Google Android Phones]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Mobile phone technology has only recently been able to meet the computing demands of augmented reality, says Blair MacIntyre (IC), who will direct a new AR lab in at Georgia Tech in collaboration with Qualcomm.&nbsp;<em>Source: UK Telegraph</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1308844456</created>  <gmt_created>2011-06-23 15:54:16</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[assisted reproductive technology]]></publication>  <article_dateline>2010-07-13T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-07-13T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-07-13T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.telegraph.co.uk/technology/news/7868707/Qualcomm-unveils-augmented-reality-platform-for-Google-Android-phones.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68496">  <title><![CDATA[Researchers Tout New Weapon in Internet Censorship Arms Race]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Nick Feamster, Santosh Vempala and grad student Sam Burnett (CS) have created a new tool that allows users to send messages through heavily censored networks by embedding them in user-generated content, such as Flickr photos or Tweets.&nbsp;<em>Source: Network World</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1308844572</created>  <gmt_created>2011-06-23 15:56:12</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[korean speech-quiz contest]]></publication>  <article_dateline>2010-07-13T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-07-13T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-07-13T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.networkworld.com/community/node/63481]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68607">  <title><![CDATA[Spotting Autism With Computers]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Within two years, Gregory Abowd and Jim Rehg (IC) hope to unveil the prototype for an automated system that could help millions more children receive early screening for autism.&nbsp;<em>Source: Atlanta Journal-Constitution</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1309285138</created>  <gmt_created>2011-06-28 18:18:58</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Spotting Autism With Computers]]></publication>  <article_dateline>2010-08-23T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-08-23T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-08-23T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.ajc.com/news/atlanta/tech-hopes-to-develop-595947.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68500">  <title><![CDATA[Has the Robot&#039;s Day Finally Arrived?]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Andrea Thomaz (IC) says the students in her Socially Intelligent Machines lab are motivated in part by the prospect of lifetime employment in the exploding field of robotics.<em>Source: PCWorld</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1308846466</created>  <gmt_created>2011-06-23 16:27:46</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[college student of the year]]></publication>  <article_dateline>2010-07-26T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-07-26T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-07-26T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.pcworld.com/article/201066/has_the_robots_day_finally_arrived.html?tk=rss]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="667"><![CDATA[robotics]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68501">  <title><![CDATA[Send in the Robots]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Robots are answering the call in a growing number of applications, from counterterrorism to surgery to food processing to home health care. "They are enabling us to do things we have never done before," says Henrik Christensen of the Center for Robotics &amp; Intelligent Machines.&nbsp;<em>Source: The New York Times</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1308846566</created>  <gmt_created>2011-06-23 16:29:26</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Extension of Self]]></publication>  <article_dateline>2010-07-26T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-07-26T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-07-26T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.nytimes.com/2010/07/18/weekinreview/18goodnews.html?_r=3&amp;pagewanted=all&amp;scp=5&amp;sq=robots&amp;st=cse]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="667"><![CDATA[robotics]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68502">  <title><![CDATA[GT Student Pens New Book for Kids]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Senior Computational Media major Tim van de Vall is the author and illustrator of "The Monkey Hole," a new chlidren's book with a subtle political twist for adults.&nbsp;<em>Source: NeighborNewspapers.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1308846677</created>  <gmt_created>2011-06-23 16:31:17</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Penning trap]]></publication>  <article_dateline>2010-07-26T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-07-26T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-07-26T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://neighbornewspapers.com/detail/161737.html?category_id=6]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68503">  <title><![CDATA[Personal Robots: Newest CS1 Teaching Tool]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Through Georgia Tech's Institute for Personal Robots in Education (IPRE), more than 1,000 students nationwide have put their intro computer science skills to the test with a personal robot. Research shows the approach may lead students to spend more time programming.&nbsp;<em>Source: Communications of the ACM</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1308846841</created>  <gmt_created>2011-06-23 16:34:01</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Fulmer Prize]]></publication>  <article_dateline>2010-07-27T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-07-27T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-07-27T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://cacm.acm.org/news/96557-personal-robots-newest-cs1-teaching-tool/fulltext]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68504">  <title><![CDATA[Study To Analyze Whether Tweets Are All Noise]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Ph.D. student Kurt Luther (IC) is part of a three-university study that will use Twitter followers' perceptions of their friends' posts to answer the question, "Who gives a Tweet?"<em>Source: InformationWorldReview.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1308846973</created>  <gmt_created>2011-06-23 16:36:13</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Children’s Healthcare of Atlant]]></publication>  <article_dateline>2010-07-28T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-07-28T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-07-28T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.iwr.co.uk/social-media/3010374/A-study-launched-to-analyse-whether-Tweets-are-all-noise]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="167543"><![CDATA[social media]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68505">  <title><![CDATA[The Limits of GPUs]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>In a presentation at HotPar 2010, Rich Vuduc (CSE) illustrated that GPUs may not be "orders of magnitude" faster than CPUs after all. Vuduc's presentation is summarized for a technical audience.&nbsp;<em>Source: RealWorldTech.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1308847049</created>  <gmt_created>2011-06-23 16:37:29</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Kayla Stoy]]></publication>  <article_dateline>2010-07-28T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-07-28T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-07-28T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.realworldtech.com/page.cfm?ArticleID=RWT072610001641&amp;p=6]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="167322"><![CDATA[supercomputing]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68506">  <title><![CDATA[Developer Preview of AR Browser Kamra Now Available]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>The open standards browser Kamra, produced by Blair MacIntyre's (IC) Augmented Environments Lab, offers users multiple, simultaneous augmented content overlayed on top of a live video scene.&nbsp;<em>Source: GizMag.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1308847927</created>  <gmt_created>2011-06-23 16:52:07</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[ida yoshinaga]]></publication>  <article_dateline>2010-08-04T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-08-04T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-08-04T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.gizmag.com/kamra-augmented-reality-browser-developer-preview-available/15922/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68507">  <title><![CDATA[Malware Threat Outpaces Antivirus Software]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>The bad guys may be getting the upper hand in devising computer viruses and other malware that evade detection by antivirus software. Paul Royal of GTISC said last year malicious code was inserted into an ad on USAToday.com, infecting browsers who were simply reading the news.&nbsp;<em>Source: Yahoo News</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1308848503</created>  <gmt_created>2011-06-23 17:01:43</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[kendo]]></publication>  <article_dateline>2010-08-04T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-08-04T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-08-04T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://news.yahoo.com/s/livescience/20100803/sc_livescience/malwarethreatoutpacesantivirussoftware]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68508">  <title><![CDATA[Hiding Files In Flickr Pics Will Fool Censors]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Ph.D. student Sam Burnett (CS) is on the team that created the anti-censorship tool Collage, which can hide messages in user-generated content. A Collage prototype is due out Friday, Aug. 13.&nbsp;<em>Source: NewScientist.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1308849398</created>  <gmt_created>2011-06-23 17:16:38</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[mental health resources for coworkers]]></publication>  <article_dateline>2010-08-10T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-08-10T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-08-10T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.newscientist.com/article/dn19284-hiding-files-in-flickr-pics-will-fool-web-censors.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68509">  <title><![CDATA[Million-Dollar Problem Cracked?]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>The "P=NP" problem is one of the most basic in computer science, and in a new, 100-page paper, an HP Labs researcher claims to have solved it. Richard Lipton (CS) has dropped everything to test the claim, writing about it on his&nbsp;<a href="http://rjlipton.wordpress.com/" target="_blank">blog</a>, which is named for the very same problem.&nbsp;<em>Source: Nature.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1308849577</created>  <gmt_created>2011-06-23 17:19:37</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Million-Dollar Problem Cracked?]]></publication>  <article_dateline>2010-08-12T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-08-12T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-08-12T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.nature.com/news/2010/100810/full/news.2010.398.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="68510">  <title><![CDATA[Collage Combats Censorship by Hiding Text in Images]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>One advantage to the anti-censorship tool Collage, developed by Nick Feamster, Santosh Vempala and grad student Sam Burnett (CS), is it allows users some deniability by hiding messages in typically innocuous content.&nbsp;<em>Source: PCMag.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1308851119</created>  <gmt_created>2011-06-23 17:45:19</gmt_created>  <changed>1475893497</changed>  <gmt_changed>2016-10-08 02:24:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Christopher Ballenger]]></publication>  <article_dateline>2010-08-16T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-08-16T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-08-16T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.pcmag.com/article2/0,2817,2367825,00.asp]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="66005">  <title><![CDATA[BrainLab Looks for Keys for Locked-In Patients]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>In this video interview, Melody Moore Jackson (IC) talks about BrainLab's search for biometric interfaces that can help those with severe neurological disabilities relearn how to move and communicate.&nbsp;<em>Source: TechDrawl</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1304697080</created>  <gmt_created>2011-05-06 15:51:20</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Naeemi]]></publication>  <article_dateline>2010-06-04T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-06-04T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-06-04T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.youtube.com/watch?v=q9H7Qb0dyw4]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="66006">  <title><![CDATA[Drinks on 5th With Chris Klaus]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>In the 1990s, College of Computing board member Chris Klaus "killed" (in a very good way) the IT security industry with Internet Security Systems; can he do the same with online gaming? Three-part video interview.&nbsp;<em>Source: TechDrawl</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1304697268</created>  <gmt_created>2011-05-06 15:54:28</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Naeemi]]></publication>  <article_dateline>2010-06-04T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-06-04T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-06-04T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://techdrawl.com/News-Post/Fresh-Voices/Drinks-On-Fifth-Chris-Klaus-Act-I]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="2356"><![CDATA[gaming]]></keyword>          <keyword tid="2678"><![CDATA[information security]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="66007">  <title><![CDATA[Kamra: First Open, Standards-Based Mobile Browser]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Blair MacIntyre (IC) heads the development team for Kamra, a web browser that overlays information from multiple website channels simultaneously onto an iPhone.&nbsp;<em>Source: Wireless Weblog</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1304697656</created>  <gmt_created>2011-05-06 16:00:56</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Georgia Cyber Center]]></publication>  <article_dateline>2010-06-08T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-06-08T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-06-08T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.wireless-weblog.com/50226711/kamra_the_first_open_standardsbased_mobile_browser.php]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="1597"><![CDATA[Augmented Reality]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="66008">  <title><![CDATA[Kids Experiment With &#039;Video Playdates&#039;]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Children playing "together" via webcam enjoy richer interaction than those watching televsion or playing video games with set rules, says Ph.D. candidate Yana Larosh (IC).<em>Source: CNN.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1304698221</created>  <gmt_created>2011-05-06 16:10:21</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Kids Experiment With &#039;Video Playdates&#039;]]></publication>  <article_dateline>2010-06-14T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-06-14T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-06-14T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.cnn.com/2010/TECH/innovation/06/11/video.playdate/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="66009">  <title><![CDATA[Intel Pivots to Supercomputing Defense]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>GPU maker NVidia may have a head start on Intel when it comes to manufacturing chips for the next generation of supercomputers, says Richard Fujimoto (CSE).&nbsp;<em>Source: FoxBusiness.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1304698406</created>  <gmt_created>2011-05-06 16:13:26</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[kyoko masuda]]></publication>  <article_dateline>2010-06-15T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-06-15T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-06-15T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.foxbusiness.com/story/markets/industries/technology/larrabee-retreat-intel-pivots-supercomputer-defense/?utm_campaign=Feed%3A+foxbusiness%2Ftechnology+(Text+-+Industries+-+Technology)&amp;utm_medium=feed&amp;utm_source=feedburner]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="66010">  <title><![CDATA[How Does a Terminator Know When to Not Terminate?]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Last year Ron Arkin (IC) completed a three-year study for the U.S. Army that tried to develop an "ethical governor" for autonomous robots used in battle.&nbsp;<em>Source: Discover Magazine (subscription required for full text)</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1304698540</created>  <gmt_created>2011-05-06 16:15:40</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[How Does a Terminator Know When to Not Terminate?]]></publication>  <article_dateline>2010-06-17T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-06-17T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-06-17T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://discovermagazine.com/2010/may/14-how-does-terminator-know-when-to-not-terminate]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="66028">  <title><![CDATA[New Tech Moves Beyond Mouse, Keyboard &amp; Screen]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>“Natural interfaces” like motion-controlled computing and contact lens screens are no longer science fiction, though Beth Mynatt (IC) says “old” standbys like keyboards will probably be around a while.&nbsp;<em>Source: CNN.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1304941661</created>  <gmt_created>2011-05-09 11:47:41</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[New Tech Moves Beyond Mouse, Keyboard &amp; Screen]]></publication>  <article_dateline>2010-06-18T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-06-18T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-06-18T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.cnn.com/2010/TECH/innovation/06/18/natural.user.interface.mouse/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="66030">  <title><![CDATA[Skribit Founder Joins Notifo as Co-Founder]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Skribit founder and College of Computing alumnus Paul Stamatiou (CM '08) and fellow grad Chad Etzel (CS '02) have joined real-time mobile notification outfit Notifo.&nbsp;<em>Source: ReadWriteWeb.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1304942377</created>  <gmt_created>2011-05-09 11:59:37</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[3d imaging]]></publication>  <article_dateline>2010-06-18T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-06-18T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-06-18T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.readwriteweb.com/archives/skribit_founder_joins_notifo_as_co-founder.php?utm_campaign=Feed%3A+readwriteweb+(ReadWriteWeb)&amp;utm_medium=feed&amp;utm_source=feedburner]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65993">  <title><![CDATA[IT Workers Teach, Learn in Georgia High Schools]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>In Georgia, unemployed IT professionals and computing teachers are joining forces to help boost the number and diversity of the state's computer science students, thanks to the College of Computing's Operation Reboot.&nbsp;<em>Source: Government Technology</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1304693965</created>  <gmt_created>2011-05-06 14:59:25</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[sidewalk]]></publication>  <article_dateline>2010-05-17T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-05-17T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-05-17T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.govtech.com/gt/762659]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65995">  <title><![CDATA[Meet Simon, the Social Robot]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Simon the Robot, a product of Andrea Thomaz' (IC) lab, is one example of social robots, which not only assist humans in everyday tasks but can interact with them, as well.<em>Source: SmartPlanet.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1304694898</created>  <gmt_created>2011-05-06 15:14:58</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Ting Zheng]]></publication>  <article_dateline>2010-05-18T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-05-18T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-05-18T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.smartplanet.com/people/blog/pure-genius/meet-simon-the-social-robot/3676/?tag=content;col1]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65996">  <title><![CDATA[Military Robots Seen as Lifesavers]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Autonomous robot soldiers in combat may be years away, but robotic technologies that can handle other dangerous duties--such as transporting supplies in hostile regions--exist now, says Henrik Christensen (IC).&nbsp;<em>Source: NPR</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1304695129</created>  <gmt_created>2011-05-06 15:18:49</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[2022 Diversity Champion awards]]></publication>  <article_dateline>2010-05-20T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-05-20T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-05-20T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.npr.org/templates/story/story.php?storyId=126973580]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65998">  <title><![CDATA[Study Shows New Way to Stop Blood Clots]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>CSE graduate student Jared Gossett is part of study that seeks to reduce risk of heart attack and stroke by inhibiting actions of a protein called fibrinogen, which is integral to blood clotting.&nbsp;<em>Source: GT Research News</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1304695494</created>  <gmt_created>2011-05-06 15:24:54</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Military Family Support]]></publication>  <article_dateline>2010-05-20T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-05-20T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-05-20T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://gtresearchnews.gatech.edu/fibrin-assembly/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65999">  <title><![CDATA[Grow Your Own AR Garden]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Blair MacIntyre (IC), one of the world's pioneers of augmented reality, sketches out the current state of the field in this half-hour episode of Bloomberg TV's "Innovators."&nbsp;<em>Source: Bloomberg.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1304695582</created>  <gmt_created>2011-05-06 15:26:22</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Grow Your Own AR Garden]]></publication>  <article_dateline>2010-05-24T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-05-24T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-05-24T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.bloomberg.com/avp/avp.htm?N=innovators&amp;T=Bloomberg%20Innovators%20Episode%206&amp;clipSRC=FLASH/innovators/innovators_episode6_reality.flv]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="66312">  <title><![CDATA[Kraken Botnet Making a Resurgence]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>The Kraken botnet--one of the Internet's largest and most difficult to detect in 2008--is rearing its ugly head again, says GTISC's Paul Royal.&nbsp;<em>Source: Dark Reading</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1306419409</created>  <gmt_created>2011-05-26 14:16:49</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Career Educator]]></publication>  <article_dateline>2010-07-01T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-07-01T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-07-01T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.darkreading.com/vulnerability_management/security/antivirus/showArticle.jhtml?articleID=225701438]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="2678"><![CDATA[information security]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="66002">  <title><![CDATA[Willow Garage Gets Robots in Researchers&#039; Hands]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>The College of Computing's Aware Home is one of 11 research initiatives around the world that will receive an open-source PR2 robot for two years from Willow Garage.&nbsp;<em>Source: CNN.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1304696113</created>  <gmt_created>2011-05-06 15:35:13</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Willow Garage Gets Robots in Researchers&#039; Hands]]></publication>  <article_dateline>2010-05-28T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-05-28T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-05-28T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.cnn.com/2010/TECH/innovation/05/27/cnet.willow.garage.robots/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="66313">  <title><![CDATA[Will Qualcomm’s Augmented Reality Play Augment Its Business?]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>The leading wireless chip maker hopes its new AR Game Studio at Georgia Tech will drive interest in mobile gaming and, yes, help the company sell more chips.&nbsp;<em>Source: Bloomberg.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1306419518</created>  <gmt_created>2011-05-26 14:18:38</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Will Qualcomm’s Augmented Reality Play Augment Its Business?]]></publication>  <article_dateline>2010-07-02T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-07-02T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-07-02T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.businessweek.com/technology/content/jul2010/tc2010071_433105.htm]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="66003">  <title><![CDATA[Are Terminators Real?]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>As lethally armed robots become increasingly vital to the world's most advanced militaries, Ron Arkin (IC) is studying how autonomous machines could be programmed to fight ethically.&nbsp;<em>Source: Discovery News</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1304696232</created>  <gmt_created>2011-05-06 15:37:12</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Delta Jacket]]></publication>  <article_dateline>2010-05-28T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-05-28T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-05-28T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://news.discovery.com/tech/are-terminators-real.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="66314">  <title><![CDATA[Georgia Tech, Qualcomm Form Game Studio]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Blair MacIntyre (IC) will lead the Qualcomm Augmented Reality Game Studio, intended to lead advances in mobile gaming and interactive media.&nbsp;<em>Source: Atlanta Business Chronicle</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1306419988</created>  <gmt_created>2011-05-26 14:26:28</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[breakthrough cases]]></publication>  <article_dateline>2010-07-02T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-07-02T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-07-02T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://atlanta.bizjournals.com/atlanta/stories/2010/06/28/daily41.html?surround=lfn]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="66004">  <title><![CDATA[Saving Lives With Ethical (Robot) Soldiers]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Military robots would have no inherent right of self-defense, says Ron Arkin (IC), and could even be programmed to allow “guilt” to influence future actions (podcast).&nbsp;<em>Source: National Academy of Engineering</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1304696408</created>  <gmt_created>2011-05-06 15:40:08</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[mary kathryn tippett]]></publication>  <article_dateline>2010-06-02T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-06-02T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-06-02T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.nae.edu/NAE/pubundcom.nsf/webviews/Engineering+Innovation+Podcast+and+Radio+Series+By+Topic:?OpenDocument&amp;RestrictToCategory=Electronics&amp;count=50000]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="66315">  <title><![CDATA[Students, Meet Your New Teacher, Mr. Robot]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Part of a new generation of social robots, Simon--from the lab of Andrea Thomaz (IC)--learns through verbal conversations with humans, who can ask, "Simon, do you have any questions?"&nbsp;<em>Source: The New York Times</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1306420289</created>  <gmt_created>2011-05-26 14:31:29</gmt_created>  <changed>1475893470</changed>  <gmt_changed>2016-10-08 02:24:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Extension of Self]]></publication>  <article_dateline>2010-07-12T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-07-12T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-07-12T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.nytimes.com/2010/07/11/science/11robots.html?_r=3]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65620">  <title><![CDATA[Aware Home Getting a &#039;Rosie the Robot&#039; Helper]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>A Personal Robot 2 (PR2) donated by Willow Garage will be put to work in the Aware Home Research Initiative, which will study how the robots could assist older adults in the household.&nbsp;<em>Source: IEEE Spectrum</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1303136367</created>  <gmt_created>2011-04-18 14:19:27</gmt_created>  <changed>1475893467</changed>  <gmt_changed>2016-10-08 02:24:27</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[ Linda Wills]]></publication>  <article_dateline>2010-05-05T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-05-05T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-05-05T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://spectrum.ieee.org/automaton/robotics/robotics-software/050410-willow-garage-giving-away-11-pr2-robots-worth-over-4-million]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65624">  <title><![CDATA[HRL Receives Award to Develop Assistive Robotics for Older Adults]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[Charlie Kemp, director of the Healthcare Robotics Lab along with his research team has been awarded the use of the PR2, a personal robot, to develop open source applications for assistive robotics. Kemp’s Healthcare Robotics Lab was one of 11 chosen from a pool of 78 submissions that included the foremost names in robotics research, such as MIT CSAIL, Stanford and UC Berkeley. Willow Garage is spending over $4.4 million for the PR2 Beta program.Kemp will be placing the PR2 in the "Aware Home" to study how robots can help with homecare and creative assistive capabilities for older adults. Their research includes developing easier ways for adults to interact with robots, and enabling robots to interact with everyday objects like drawers, lamps, and light switches. The Sponsor of the PR2 Competition was Willow Garage, a company that develops hardware and open source software for personal robotics applications. The awards were announced at the 2010 IEEE International Conference on Robotics and Automation (ICRA) held in Anchorage, Alaska from May 3rd – 8th.&nbsp;Other Investigators on this proposal include, Profs. Wendy Rogers (Psychology), Jim Rehg (Interactive Computing), Andrea Thomaz (Interactive Computing) and Brian Jones (Director, Aware Home Research Initiative).<p></p><p>Charlie Kemp, director of the Healthcare Robotics Lab along with his research team has been awarded the use of the PR2, a personal robot, to develop open source applications for assistive robotics. Kemp’s Healthcare Robotics Lab was one of 11 chosen from a pool of 78 submissions that included the foremost names in robotics research, such as MIT CSAIL, Stanford and UC Berkeley. Willow Garage is spending over $4.4 million for the PR2 Beta program.</p><p>&nbsp;</p><p>Kemp will be placing the PR2 in the "Aware Home" to study how robots can help with homecare and creative assistive capabilities for older adults. Their research includes developing easier ways for adults to interact with robots, and enabling robots to interact with everyday objects like drawers, lamps, and light switches. The Sponsor of the PR2 Competition was Willow Garage, a company that develops hardware and open source software for personal robotics applications. The awards were announced at the 2010 IEEE International Conference on Robotics and Automation (ICRA) held in Anchorage, Alaska from May 3rd – 8th.&nbsp;</p><p>&nbsp;</p><p>Other Investigators on this proposal include, Profs. Wendy Rogers (Psychology), Jim Rehg (Interactive Computing), Andrea Thomaz (Interactive Computing) and Brian Jones (Director, Aware Home Research Initiative).</p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1303137107</created>  <gmt_created>2011-04-18 14:31:47</gmt_created>  <changed>1475893467</changed>  <gmt_changed>2016-10-08 02:24:27</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[S.C.]]></publication>  <article_dateline>2010-05-07T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-05-07T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-05-07T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.willowgarage.com/blog/2010/06/07/spotlight-georgia-tech]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>          <category tid="152"><![CDATA[Robotics]]></category>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65625">  <title><![CDATA[Robot Masters the Art of Opening Doors and Drawers]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Professor Charlie Kemp and Advait Jain at Georgia Tech's&nbsp;<a href="http://hg.gatech.edu/hrl/index.shtml" target="_blank">Healthcare Robotics Laboratory</a>&nbsp;have programmed a robot to autonomously approach and open doors and drawers.</p><p>It does that using omni-directional wheels and compliant arms, and the only information it needs is the location and orientation of the handles. The researchers discussed their results at the IEEE International Conference on Robotics and Automation, held May 3rd – 8th in Anchorage, Alaska, where they presented a paper, "Pulling Open Doors and Drawers: Coordinating an Omni-Directional Base and a Compliant Arm with Equilibrium Point Control.</p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1303137311</created>  <gmt_created>2011-04-18 14:35:11</gmt_created>  <changed>1475893467</changed>  <gmt_changed>2016-10-08 02:24:27</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[MS in Analytics]]></publication>  <article_dateline>2010-05-07T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-05-07T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-05-07T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://spectrum.ieee.org/automaton/robotics/medical-robots/050610-georgia-tech-robot-masters-art-of-opening-doors-and-drawers]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="2157"><![CDATA[Charlie Kemp]]></keyword>          <keyword tid="10485"><![CDATA[CHR]]></keyword>          <keyword tid="2155"><![CDATA[healthcare robotics]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65631">  <title><![CDATA[U.S. News &amp; World Report]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>With $2.5 million in NSF funding, Operation Reboot is pairing up unemployed IT professionals with high school CS teachers, helping both learn valuable new skills.<em>Source: U.S. News &amp; World Report</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1303138117</created>  <gmt_created>2011-04-18 14:48:37</gmt_created>  <changed>1475893467</changed>  <gmt_changed>2016-10-08 02:24:27</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[equitable learning]]></publication>  <article_dateline>2010-05-11T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-05-11T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-05-11T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.usnews.com/science/articles/2010/05/10/operation-reboot-it-professionals-become-computer-science-teachers.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65632">  <title><![CDATA[Solution for African Health Data is BLIS]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>The Basic Laboratory Information System (BLIS), conceived in the College's Computing for Good class and developed by master's student Ruban Monu, is undergoing a pilot implementation in four African nations.&nbsp;<em>Source: The Post (Cameroon)</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1303138213</created>  <gmt_created>2011-04-18 14:50:13</gmt_created>  <changed>1475893467</changed>  <gmt_changed>2016-10-08 02:24:27</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[protecting warfighters]]></publication>  <article_dateline>2010-05-11T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-05-11T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-05-11T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.thepostwebedition.com/Content.aspx?ItemID=3423&amp;ModuleID=11]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="7806"><![CDATA[computing for good]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65634">  <title><![CDATA[Georgia Tech Students to Sweep Health IT Coding Challenge]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[A team of students from the College of Computing at Georgia Tech, calling themselves the Georgia Tech Flatliners, recently participated in, and took the first three prizes, at the National Health Information Network (NHIN) Code-a-thon Challenge held at Florida International University (FIU). &nbsp;The Flatliners were enrolled in the Health Informatics class taught by HSI Associate Director, Mark Braunstein, MD, also a Professor of the Practice, in the College of Computing.A team of students from the College of Computing at Georgia Tech, calling themselves the Georgia Tech Flatliners, recently participated in, and took the first three prizes, at the National Health Information Network (NHIN) Code-a-thon Challenge held at Florida International University (FIU). &nbsp;The Flatliners were enrolled in the Health Informatics class taught by HSI Associate Director, Mark Braunstein, MD, also a Professor of the Practice, in the College of Computing.The event was co-hosted by FIU, Open Health Tools (OHT) – an open source community for Health IT and the American Academy of Family Physicians National Research Network. &nbsp;Sponsored by Medicity, the GT Flatliners comprised Ph.D. student Klara Benda and master’s students Adrian Courreges, Monosij Dutta-Roy and Hassan Khan. The NHIN Challenge asked teams to create innovative stylesheets to display the information in a Continuity of Care Document (CCD) to a primary care physician taking calls from patients after office hours. The idea is to develop a CCD visualization tool that facilitates an efficient and effective phone consultation between the on-call doctor and an unfamiliar patient. Not only did the solutions have to interpret and display data error-free; they also had to facilitate the most efficient use of the physician’s time. The Flatliners, competing against professionals in the Health IT field, came up with the following solutions – a problem-based approach, a multi-context approach and a rapid-access approach:• Problem Oriented Approach (winner): arranged the clinical data by problem so that the physician could hone in on relevant information to the particular problem the patient is presenting.• Multi-Context Approach (second place): provided a highly flexible visual display that allows the physician to arrange information according to his or her particular "mental model" for handling a particular problem.• Rapid Access Approach (third place): provided quick and easy direct navigation among all of the clinical areas in which data is stored in the CCD.<p>&nbsp;</p><p>A team of students from the College of Computing at Georgia Tech, calling themselves the Georgia Tech Flatliners, recently participated in, and took the first three prizes, at the National Health Information Network (NHIN) Code-a-thon Challenge held at Florida International University (FIU). &nbsp;The Flatliners were enrolled in the Health Informatics class taught by HSI Associate Director, Mark Braunstein, MD, also a Professor of the Practice, in the College of Computing.</p><p>&nbsp;</p><p>A team of students from the College of Computing at Georgia Tech, calling themselves the Georgia Tech Flatliners, recently participated in, and took the first three prizes, at the National Health Information Network (NHIN) Code-a-thon Challenge held at Florida International University (FIU). &nbsp;The Flatliners were enrolled in the Health Informatics class taught by HSI Associate Director, Mark Braunstein, MD, also a Professor of the Practice, in the College of Computing.</p><p>&nbsp;</p><p>The event was co-hosted by FIU, Open Health Tools (OHT) – an open source community for Health IT and the American Academy of Family Physicians National Research Network. &nbsp;Sponsored by Medicity, the GT Flatliners comprised Ph.D. student Klara Benda and master’s students Adrian Courreges, Monosij Dutta-Roy and Hassan Khan. The NHIN Challenge asked teams to create innovative stylesheets to display the information in a Continuity of Care Document (CCD) to a primary care physician taking calls from patients after office hours. The idea is to develop a CCD visualization tool that facilitates an efficient and effective phone consultation between the on-call doctor and an unfamiliar patient. Not only did the solutions have to interpret and display data error-free; they also had to facilitate the most efficient use of the physician’s time. The Flatliners, competing against professionals in the Health IT field, came up with the following solutions – a problem-based approach, a multi-context approach and a rapid-access approach:</p><p>&nbsp;</p><p>• Problem Oriented Approach (winner): arranged the clinical data by problem so that the physician could hone in on relevant information to the particular problem the patient is presenting.</p><p>• Multi-Context Approach (second place): provided a highly flexible visual display that allows the physician to arrange information according to his or her particular "mental model" for handling a particular problem.</p><p>• Rapid Access Approach (third place): provided quick and easy direct navigation among all of the clinical areas in which data is stored in the CCD.</p><p>&nbsp;</p><p><a href="http://hit.fiu.edu/challenge.htm" title="http://hit.fiu.edu/challenge.htm">http://hit.fiu.edu/challenge.htm</a></p><p><a href="http://albums.phanfare.com/isolated/btHbwEHy/1/4656319#imageID=98661806" title="http://albums.phanfare.com/isolated/btHbwEHy/1/4656319#imageID=98661806">http://albums.phanfare.com/isolated/btHbwEHy/1/4656319#imageID=98661806</a></p><p>&nbsp;</p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1303139478</created>  <gmt_created>2011-04-18 15:11:18</gmt_created>  <changed>1475893467</changed>  <gmt_changed>2016-10-08 02:24:27</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Ashleyville]]></publication>  <article_dateline>2010-05-11T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-05-11T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-05-11T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.gatech.edu/newsroom/release.html?nid=55581]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="9259"><![CDATA[coding]]></keyword>          <keyword tid="2679"><![CDATA[it]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65091">  <title><![CDATA[Spanish Authorities Bust 3 in Botnet Ring]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>The Mariposa botnet had become one of the biggest weapons in cybercrime, infecting as many as 12.7 million PCs. With Georgia Tech's help, the Spanish government has arrested the ringleaders.&nbsp;<em>Source: Associated Press</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1300891036</created>  <gmt_created>2011-03-23 14:37:16</gmt_created>  <changed>1475893464</changed>  <gmt_changed>2016-10-08 02:24:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[management of technology and innovation]]></publication>  <article_dateline>2010-03-04T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-03-04T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-03-04T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://hosted.ap.org/dynamic/stories/U/US_TEC_BOTNET_BUSTED?CTIME=2010-03-02-14-26-32&amp;SECTION=HOME&amp;SITE=AP&amp;TEMPLATE=DEFAULT]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65196">  <title><![CDATA[Surround Vision Gives TV Viewers Off-Camera Window]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Surround Video, which allows viewers to see off-camera action by pointing a smartphone beyond a TV screen, "hits a balance between the capabilities of current technology and the long-term vision of immersive video," says Blair MacIntyre (IC).&nbsp;<em>Source: NewScientist.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1301323830</created>  <gmt_created>2011-03-28 14:50:30</gmt_created>  <changed>1475893464</changed>  <gmt_changed>2016-10-08 02:24:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[mental health resources for coworkers]]></publication>  <article_dateline>2010-04-15T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-04-15T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-04-15T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.newscientist.com/article/dn18781-surround-vision-gives-tv-viewers-offcamera-window.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="1597"><![CDATA[Augmented Reality]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65092">  <title><![CDATA[Accused Spanish Hackers Used a Kit]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>The Mariposa botnet criminals, arrested this week in Spain with the help of the Georgia Tech Information Security Center, used a kit to build their botnet and would not need to be skilled hackers.&nbsp;<em>Source: CIO Today.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1300891195</created>  <gmt_created>2011-03-23 14:39:55</gmt_created>  <changed>1475893464</changed>  <gmt_changed>2016-10-08 02:24:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Accused Spanish Hackers Used a Kit]]></publication>  <article_dateline>2010-03-04T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-03-04T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-03-04T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.cio-today.com/story.xhtml?full_skip=1&amp;story_id=71989]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65197">  <title><![CDATA[Telecomm Group Looking at Smartphone Security]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Two College of Computing research centers are working with the Telecommunications Industry Association to identify security standards for smartphones.&nbsp;<em>Source: TechJournal South</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1301323911</created>  <gmt_created>2011-03-28 14:51:51</gmt_created>  <changed>1475893464</changed>  <gmt_changed>2016-10-08 02:24:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Aditya Garg]]></publication>  <article_dateline>2010-04-15T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-04-15T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-04-15T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.techjournalsouth.com/2010/04/telecommunications-standards-group-looking-at-smart-device-security/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="2678"><![CDATA[information security]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65093">  <title><![CDATA[Accused Spanish Hackers Used a Kit]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>The Mariposa botnet criminals, arrested this week in Spain with the help of the Georgia Tech Information Security Center, used a kit to build their botnet and would not need to be skilled hackers.&nbsp;<em>Source: CIO Today.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1300891296</created>  <gmt_created>2011-03-23 14:41:36</gmt_created>  <changed>1475893464</changed>  <gmt_changed>2016-10-08 02:24:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Accused Spanish Hackers Used a Kit]]></publication>  <article_dateline>2010-03-04T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-03-04T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-03-04T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.cio-today.com/story.xhtml?full_skip=1&amp;story_id=71989]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65094">  <title><![CDATA[Monster Botnet Held 800K People&#039;s Details]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>A fourth "zombie administrator" of the Mariposa botnet could be based in Venezuela, say the Spanish authorities who last week arrested three ringleaders with Georgia Tech's help.<em>Source: The Register</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1300891374</created>  <gmt_created>2011-03-23 14:42:54</gmt_created>  <changed>1475893464</changed>  <gmt_changed>2016-10-08 02:24:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[yearlong program]]></publication>  <article_dateline>2010-03-08T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-03-08T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-03-08T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.theregister.co.uk/2010/03/04/mariposa_police_hunt_more_botherders/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65095">  <title><![CDATA[Is Chasing Cybercrooks Worth It?]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Going after the bad guys isn't the only way to take a bite out of cybercrime, says Mustaque Ahamad (CS). Remote monitoring of computers' anti-virus software is another valuable option.&nbsp;<em>Source: CNN.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1300891481</created>  <gmt_created>2011-03-23 14:44:41</gmt_created>  <changed>1475893464</changed>  <gmt_changed>2016-10-08 02:24:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Is Chasing Cybercrooks Worth It?]]></publication>  <article_dateline>2010-03-08T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-03-08T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-03-08T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://edition.cnn.com/2010/TECH/03/05/cyberattack.prosecute/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65097">  <title><![CDATA[An International Perspective on Service Robotics]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Speaking at International Expert Days in Lauffin, Germany, Henrik Christensen and Mike Stilman (IC) shared their ideas on service robotics, a U.S. robotics roadmap, humanoid robot motion and more.&nbsp;<em>Source: Everything Robotic</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1300891588</created>  <gmt_created>2011-03-23 14:46:28</gmt_created>  <changed>1475893464</changed>  <gmt_changed>2016-10-08 02:24:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[nineteeth century]]></publication>  <article_dateline>2010-03-10T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-03-10T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-03-10T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://everything-robotic.blogspot.com/2010/03/contraindications-of-service-robotics.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65152">  <title><![CDATA[Online Threat Shuts Minneapolis School]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>The Internet "makes it easier for unskilled vandals to hide behind anonymity," says Jon Giffin (CS). "It's just the modern equivalent of someone calling in a bomb scare."&nbsp;<em>Source: TwinCities.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1300977401</created>  <gmt_created>2011-03-24 14:36:41</gmt_created>  <changed>1475893464</changed>  <gmt_changed>2016-10-08 02:24:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Tracking Aerosol Convection Interactions Experiment]]></publication>  <article_dateline>2010-03-13T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-03-13T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-03-13T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.twincities.com/ci_14658322?nclick_check=1]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>          <category tid="132"><![CDATA[Institute Leadership]]></category>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65154">  <title><![CDATA[Tech Style: Wearable Computing Fashions]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Graduate student Scott Gilliland (CS) talks about the tools and technology behind wearable computing in this Daily Planet video (see 4:07 mark).&nbsp;<em>Source: Discovery Channel</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1300979167</created>  <gmt_created>2011-03-24 15:06:07</gmt_created>  <changed>1475893464</changed>  <gmt_changed>2016-10-08 02:24:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Application Cycle]]></publication>  <article_dateline>2010-03-15T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-03-15T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-03-15T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://watch.discoverychannel.ca/daily-planet/march-2010/daily-planet---march-03-2010/#clip272477]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65155">  <title><![CDATA[Bill Could Restrict Funds for Nations Ignoring Cybercrime]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>A bipartisan Senate bill introduced this week is a key first step to prodding other nations to help fight a growing threat, says Sy Goodman (CS).&nbsp;<em>Source: SC Magazine</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1300979892</created>  <gmt_created>2011-03-24 15:18:12</gmt_created>  <changed>1475893464</changed>  <gmt_changed>2016-10-08 02:24:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Research on Careers in Science Lab]]></publication>  <article_dateline>2010-03-25T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-03-25T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-03-25T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.scmagazineus.com/bill-could-restrict-funds-for-nations-ignoring-cybercrime/article/166449/?utm_campaign=Feed%3A+SCMagazineNews+(SC+Magazine+News)&amp;utm_medium=feed&amp;utm_source=feedburner]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="345"><![CDATA[cyber security]]></keyword>          <keyword tid="2678"><![CDATA[information security]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65156">  <title><![CDATA[&#039;LifeNet&#039; Offers Improved Disaster Communications]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Santosh Vempala (CS) talks about the development plans for LifeNet, an ad hoc networking solution scheduled for wider testing this summer.&nbsp;<em>Source: WABE</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1300981671</created>  <gmt_created>2011-03-24 15:47:51</gmt_created>  <changed>1475893464</changed>  <gmt_changed>2016-10-08 02:24:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[2022 benefits]]></publication>  <article_dateline>2010-03-26T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-03-26T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-03-26T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.publicbroadcasting.net/wabe/news.newsmain/article/0/1/1628449/Atlanta/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="7806"><![CDATA[computing for good]]></keyword>          <keyword tid="1144"><![CDATA[networking]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65157">  <title><![CDATA[Toward a Private, Networked Life]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Through social media, today's teens share more of themselves than any generation before. Amy Bruckman (IC) says, in the long run, that could lead to more tolerance. Story in French.&nbsp;<em>Source: Le Monde</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1300981894</created>  <gmt_created>2011-03-24 15:51:34</gmt_created>  <changed>1475893464</changed>  <gmt_changed>2016-10-08 02:24:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Flex LED project]]></publication>  <article_dateline>2010-03-26T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-03-26T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-03-26T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.lemonde.fr/technologies/article/2010/03/26/vers-une-vie-privee-en-reseau_1324942_651865_1.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="168898"><![CDATA[social network]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65186">  <title><![CDATA[LifeNet Aims for Wireless Network Innovation]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>The ad hoc system designed for disaster relief situations relies on a "flexible routing" protocol to make devices both clients and routers, says Santosh Vempala (CS).&nbsp;<em>Source: Network World</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1301322026</created>  <gmt_created>2011-03-28 14:20:26</gmt_created>  <changed>1475893464</changed>  <gmt_changed>2016-10-08 02:24:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[korean speech-quiz contest]]></publication>  <article_dateline>2010-03-29T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-03-29T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-03-29T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.networkworld.com/news/2010/032610-georgia-tech-lifenet.html?hpg1=bn]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65189">  <title><![CDATA[Creativity Explodes on Chatroulette]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>One of the most interesting things about Chatroulette is the artistic directions people take with it, says Ph.D. candidate Sarita Yardi. "You have an instant audience."&nbsp;<em>Source: Cnet.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1301322944</created>  <gmt_created>2011-03-28 14:35:44</gmt_created>  <changed>1475893464</changed>  <gmt_changed>2016-10-08 02:24:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Creativity Explodes on Chatroulette]]></publication>  <article_dateline>2010-03-29T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-03-29T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-03-29T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://news.cnet.com/8301-13772_3-20001226-52.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65190">  <title><![CDATA[Hackers Could Target Pacemakers]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>If future devices will have enhanced security, planning needs to start now, says Mustaque Ahamad (CS). "Most of the security researchers agree that security cannot be added on," he said.&nbsp;<em>Source: ABCNews.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1301323094</created>  <gmt_created>2011-03-28 14:38:14</gmt_created>  <changed>1475893464</changed>  <gmt_changed>2016-10-08 02:24:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Hackers Could Target Pacemakers]]></publication>  <article_dateline>2010-04-01T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-04-01T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-04-01T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://abcnews.go.com/Health/HeartFailureNews/security-experts-hackers-pacemakers/story?id=10255194&amp;page=1]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="8677"><![CDATA[health information technology]]></keyword>          <keyword tid="2678"><![CDATA[information security]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65191">  <title><![CDATA[Gaming Degrees Grow in Popularity, Application]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Gaming may drive research in the Augmented Environments Lab, but its director, Blair MacIntyre (IC), says there are many other important applications.&nbsp;<em>Source: NPR.org</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1301323220</created>  <gmt_created>2011-03-28 14:40:20</gmt_created>  <changed>1475893464</changed>  <gmt_changed>2016-10-08 02:24:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Gaming Degrees Grow in Popularity, Application]]></publication>  <article_dateline>2010-04-06T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-04-06T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-04-06T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.npr.org/templates/player/mediaPlayer.html?action=1&amp;id=125588087&amp;islist=false&amp;m=125594164&amp;t=1]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65090">  <title><![CDATA[GT Helps Spain Take Down Botnet]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Georgia Tech Information Security Center (GTISC) researchers helped Spanish authorities detect and dismantle a massive botnet network, called Mariposa, that infected computers linked to 13 million unique IP addresses.&nbsp;<em>Source: ComputerWorld</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1300890737</created>  <gmt_created>2011-03-23 14:32:17</gmt_created>  <changed>1475893464</changed>  <gmt_changed>2016-10-08 02:24:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Jill Gostin]]></publication>  <article_dateline>2010-03-03T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-03-03T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-03-03T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.computerworld.com/s/article/9164838/Spanish_police_take_down_massive_Mariposa_botnet?source=rss_news]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="65194">  <title><![CDATA[Are Robots Alive?]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>"Some say robots are alive because they can have emergent intelligence," says Ayanna Howard (IC). "They can emerge behaviors and therefore ... they have semblance of being alive, just like people."&nbsp;<em>Source: Discovery News</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1301323646</created>  <gmt_created>2011-03-28 14:47:26</gmt_created>  <changed>1475893464</changed>  <gmt_changed>2016-10-08 02:24:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Delta Jacket]]></publication>  <article_dateline>2010-04-09T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-04-09T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-04-09T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://news.discovery.com/tech/are-robots-alive.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62881">  <title><![CDATA[Good Ideas Department?: Teaching Robots to Deceive]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Alan Wagner (IC) discusses the how he helped teach robots to deceive and responds to questions about why robot deception is necessary.&nbsp;</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1290185949</created>  <gmt_created>2010-11-19 16:59:09</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[JAG]]></publication>  <article_dateline>2010-10-26T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-26T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-26T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://blogs.wsj.com/digits/2010/10/25/good-ideas-department-teaching-robots-to-deceive/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10604"><![CDATA[Deception]]></keyword>          <keyword tid="1356"><![CDATA[robot]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62883">  <title><![CDATA[Robot teachers invade South Korean classrooms]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>South Korea is using telepresence robots to teach children English. Tucker Balch (IC) comments that "it may be better to have a telepresence robot from a highly skilled teacher than to have just an average teacher in the classroom."&nbsp;</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1290186082</created>  <gmt_created>2010-11-19 17:01:22</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Gwendell Thomas]]></publication>  <article_dateline>2010-10-26T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-26T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-26T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://articles.cnn.com/2010-10-22/tech/south.korea.robot.teachers_1_robot-english-teachers?_s=PM:TECH]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="3050"><![CDATA[distance learning]]></keyword>          <keyword tid="1356"><![CDATA[robot]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62934">  <title><![CDATA[Blood Simulation on Jaguar Takes Gordon Bell Prize]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>A team from Georgia Tech, NYU, and Oak Ridge National Lab used 196,000 of Jaguar's 224,000 processor cores to simulate 200 million red blood cells and their interaction with plasma in the circulatory system.&nbsp;</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1290511447</created>  <gmt_created>2010-11-23 11:24:07</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Brett Aiello]]></publication>  <article_dateline>2010-11-23T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-11-23T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-11-23T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.hpcwire.com/offthewire/Blood-Simulation-on-Jaguar-Takes-Gordon-Bell-Prize-109907029.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="11341"><![CDATA[Gordon Bell Prize]]></keyword>          <keyword tid="167322"><![CDATA[supercomputing]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62900">  <title><![CDATA[Nerdiness Turns Women Off to Computer Science]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>A new University of Washington study suggests that traditional "nerdy" images of computer scientists, along with the paraphernalia that accompanies those images (think "Star Trek"), keep more women from entering the field. Mark Guzdial, professor in Interactive Computing and director of Georgia Computes!, agrees but says a little truth can dispel a lot of stereotypes. <em>Source: Discovery.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1290427930</created>  <gmt_created>2010-11-22 12:12:10</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Nerdiness Turns Women Off to Computer Science]]></publication>  <article_dateline>2010-01-05T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-01-05T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-01-05T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://news.discovery.com/human/nerds-women-computer-science.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10469"><![CDATA[Mark Guzdial]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62884">  <title><![CDATA[Supercomputing Meets Social Media]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>GraphCT, software developed by Georgia Tech's David Bader (CSE), uses a super computer to map the twitter network data to a graph and uses metrics to assign importance to interactions. This allows us to see the impact and significance of tweets. </p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1290186220</created>  <gmt_created>2010-11-19 17:03:40</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Brett Aiello]]></publication>  <article_dateline>2010-10-26T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-26T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-26T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.hpcwire.com/blogs/Supercomputing-Meets-Social-Media-105493293.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50877"><![CDATA[School of Computational Science and Engineering]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="167325"><![CDATA[supercomputer]]></keyword>          <keyword tid="11053"><![CDATA[tweets]]></keyword>          <keyword tid="314"><![CDATA[twitter]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62953">  <title><![CDATA[Study Groups Move Online, Attract Students Worldwide]]></title>  <uid>27174</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>"We are empowering the student community to take care of itself," says Ashwin Ram (<em>Interactive Computing</em>), co-founder of OpenStudy, which provides 350 online study groups for independent learners around the globe. <em>Source: AJC.com</em></p>]]></body>  <author>Mike Terrazas</author>  <status>1</status>  <created>1290546795</created>  <gmt_created>2010-11-23 21:13:15</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Study Groups Move Online, Attract Students Worldwide]]></publication>  <article_dateline>2010-11-23T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-11-23T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-11-23T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.ajc.com/news/atlanta/study-groups-move-online-752264.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10603"><![CDATA[collaborative learning]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62902">  <title><![CDATA[Wanted: &#039;Cyber Ninjas&#039;]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Computer security is one of the hottest job fields around right now, with demand for trained experts exceeding current supply. The College of Computing's online master's program in information security is intended to meet the world's growing call for "cyber ninjas." <em>Source: The New York Times</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1290428091</created>  <gmt_created>2010-11-22 12:14:51</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Extension of Self]]></publication>  <article_dateline>2010-01-05T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-01-05T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-01-05T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.nytimes.com/2010/01/03/education/edlife/03cybersecurity.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62885">  <title><![CDATA[Supercomputer Digests Twitter in Real-Time]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>A supercomputer, the 128-CPU Cray XMT, using custom software co-created by David Bader (CSE) can digest an entire day's worth of twitter feeds in under an hour. </p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1290186623</created>  <gmt_created>2010-11-19 17:10:23</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[CREST D-Map]]></publication>  <article_dateline>2010-10-26T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-26T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-26T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.technologyreview.com/blog/mimssbits/25913/?ref=rss]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50877"><![CDATA[School of Computational Science and Engineering]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="167325"><![CDATA[supercomputer]]></keyword>          <keyword tid="314"><![CDATA[twitter]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="63061">  <title><![CDATA[New Supercomputer Criteria]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>David Bader <em>(CompSci &amp; Eng)</em> and colleagues helped create a set of new benchmarks, called Graph500, to clock supercomputing speeds, but owners of some of the world’s fastest machines are balking at the new tests.<em></em></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1291394966</created>  <gmt_created>2010-12-03 16:49:26</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[ISyE Graduate Rankings]]></publication>  <article_dateline>2010-11-29T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-11-29T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-11-29T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.mb.com.ph/articles/289193/when-being-nice-doesnt-pay]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50877"><![CDATA[School of Computational Science and Engineering]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="167322"><![CDATA[supercomputing]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62903">  <title><![CDATA[Augmented Reality: Nearly But Not Quite]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>While a wave of AR apps has appeared for iPhone and Google Android, augmented reality currently is limited by the precision of its GPS technology. Blair MacIntyre, associate professor and director of the Augmented Environments Lab in Interactive Computing, suggests crowdsourcing as the solution for AR's geo-locational shortcomings. <em>Source: Orange-Business.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1290428220</created>  <gmt_created>2010-11-22 12:17:00</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Kashlan triplets]]></publication>  <article_dateline>2010-01-05T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-01-05T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-01-05T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.orange-business.com/en/mnc2/footer/news/enterprise_briefing/december2009/new-analysis.jsp]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="1600"><![CDATA[Blair MacIntrye]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62880">  <title><![CDATA[Technology Said To Thwart Voice Phishing Scams]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p> Vijay Balasubramaniyan (CS) comments on how the voice authentication technology VoIP can identify trusted callers.<em></em><br /></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1290185828</created>  <gmt_created>2010-11-19 16:57:08</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Anh-Vu Pham]]></publication>  <article_dateline>2010-10-27T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-27T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-27T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.eetimes.com/electronics-news/4210106/Technology-said-to-thwart-voice-phishing-scams]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="11078"><![CDATA[telephone scammers]]></keyword>          <keyword tid="2685"><![CDATA[voip]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="63062">  <title><![CDATA[War Machines: Recruiting Robots for Combat]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Ron Arkin <em>(Interactive Computing)</em> comments on researchers’ ability to create ethical robots that conform to the laws of war and the military rules of escalation.<em></em></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1291395044</created>  <gmt_created>2010-12-03 16:50:44</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Would never be part of any organization that would have me as a member]]></publication>  <article_dateline>2010-11-29T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-11-29T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-11-29T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.nytimes.com/2010/11/28/science/28robot.html?_r=2]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="1496"><![CDATA[Ethics]]></keyword>          <keyword tid="525"><![CDATA[military]]></keyword>          <keyword tid="2352"><![CDATA[robots]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62904">  <title><![CDATA[The Future of Brain-Controlled Devices]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>In the hit movie "Avatar," a paraplegic Marine finds his legs again through a chamber that links his brain directly to a surrogate alien via computer. Science fiction? Perhaps, but direct brain interfaces are becoming more sophisticated every day. "We don't know what the limits are yet," says Melody Moore Jackson, associate professor and director of the BrainLab in Interactive Computing. <em>Source: CNN.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1290428824</created>  <gmt_created>2010-11-22 12:27:04</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[The Future of Brain-Controlled Devices]]></publication>  <article_dateline>2010-01-05T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-01-05T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-01-05T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.cnn.com/2009/TECH/12/30/brain.controlled.computers/index.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10480"><![CDATA[Melody Moore Jackson]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="63063">  <title><![CDATA[New Social Software Tries to Make Studying Feel Like Facebook]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Georgia Tech and Emory's OpenStudy is termed the "Match.com" of the online study world, but some worry what may happen to the popularity of the site, if students cannot find a date. <a title="OpenStudy" href="http://www.youtube.com/watch?v=IeLDJkCzCiY" target="_blank">Aswin Ram (<em>Interactive Computing</em>) discusses why students use OpenStudy</a>.<em> <br /></em></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1291395390</created>  <gmt_created>2010-12-03 16:56:30</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[wiggling robots]]></publication>  <article_dateline>2010-11-29T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-11-29T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-11-29T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://chronicle.com/article/New-Social-Software-Tries-to/125542/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10603"><![CDATA[collaborative learning]]></keyword>          <keyword tid="11113"><![CDATA[OpenStudy]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62905">  <title><![CDATA[A Robot Named Shimon Wants To Jam With You]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Last month, an improvisational jazz musician named Shimon hooked up to jam online with some iPhone-wielding Japanese through an application called ZoozBeat. Shimon, by the way, is a robot. He's programmed to improvise in the style of jazz great Thelonious Monk, says creator Gil Weinberg, adjunct associate professor in Interactive Computing. <em>Source: NPR.org</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1290429118</created>  <gmt_created>2010-11-22 12:31:58</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[A Robot Named Shimon Wants To Jam With You]]></publication>  <article_dateline>2010-01-05T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-01-05T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-01-05T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.npr.org/templates/story/story.php?f=2&amp;ft=1&amp;storyId=121763193&amp;utm_campaign=Feed%3A+NprProgramsATC+(NPR+Programs%3A+All+Things+Considered)&amp;utm_medium=feed&amp;utm_source=feedburner]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="1939"><![CDATA[Gil Weinberg]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="63064">  <title><![CDATA[Point-Counterpoint: Learning with Social Media]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Combining social media with learning, using sites like OpenStudy, increases students' level of engagement by allowing them to interact more with the material and other students.<em> <br /></em></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1291395571</created>  <gmt_created>2010-12-03 16:59:31</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[all of whom have significant administrative experience on top of their scholarly accomplishments. Bhatti was nominated by senior leadership for this intensive]]></publication>  <article_dateline>2010-12-02T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-12-02T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-12-02T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.theramonline.com/news/point-counterpoint-learning-with-social-media-1.2419170]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10603"><![CDATA[collaborative learning]]></keyword>          <keyword tid="167543"><![CDATA[social media]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="63399">  <title><![CDATA[Robots to Shape Wars of Future]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Mr. Spock can relate to certain advantages of having robots in the combat zone: They are free of human emotion, which can distort judgment, and they don't express anger or frustration. But Ron Arkin, Regents' Professor and director of the Mobile Robot Laboratory in Interactive Computing, envisions robots designed with some capabilities—if not exactly feelings—that would be constructive: Remorse, compassion, and yes, guilt. <em>Source: USA Today</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1294323728</created>  <gmt_created>2011-01-06 14:22:08</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[sustainable fuels]]></publication>  <article_dateline>2010-01-05T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-01-05T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-01-05T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.usatoday.com/tech/science/2009-12-28-robot-weapons-guilt_N.htm]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="11106"><![CDATA[Ronald Arkin]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="63078">  <title><![CDATA[Arrest Made In Vegas May Rid The World of One-Third of All Spam]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Nick Feamster <em>(Computer Science)</em> comments on the botnet named Mega D, and how even though the creator of the botnet is in authorities hands, Mega D may still be alive and well. (audio story)&nbsp;<em></em></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1291718917</created>  <gmt_created>2010-12-07 10:48:37</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[comedians]]></publication>  <article_dateline>2010-12-07T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-12-07T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-12-07T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://marketplace.publicradio.org/display/web/2010/12/06/tech-report-arrest-made-in-vegas/?refid=0]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10838"><![CDATA[botnets]]></keyword>          <keyword tid="168881"><![CDATA[spam]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="63400">  <title><![CDATA[Damage Control]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Of all the security responsibilities facing the campus IT team, handheld-device security may be the most difficult. Since mobile malware and other threats were cited as the top IT security concerns by the "Emerging Cyber Threats Report for 2009," published by the Georgia Tech Information Security Center, smartphones have only become more ubiquitous as conveniences--and targets. <em>Source: CampusTechnology.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1294324059</created>  <gmt_created>2011-01-06 14:27:39</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[emma bivings]]></publication>  <article_dateline>2010-01-05T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-01-05T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-01-05T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://campustechnology.com/articles/2010/01/01/damage-control.aspx]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="63258">  <title><![CDATA[Kinect Hacks: American Sign Language Recognition]]></title>  <uid>27174</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Researcher in Thad Starner's (<em>Interactive Computing</em>) lab have paired up Microsoft's Kinect device with custom software that enables the Kinect to interpret a limited American Sign Language vocabulary with greater than 98 percent accuracy. <em>Source: Joystiq.com</em></p>]]></body>  <author>Mike Terrazas</author>  <status>1</status>  <created>1292941137</created>  <gmt_created>2010-12-21 14:18:57</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[female leader]]></publication>  <article_dateline>2010-12-21T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-12-21T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-12-21T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.joystiq.com/2010/12/20/kinect-hacks-american-sign-language-recognition/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="63294">  <title><![CDATA[What Should a 21st Century University Look Like?]]></title>  <uid>27174</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>“The driving idea ... is to take a 100-year view of what universities will be like in the 21st century,” says Rich DeMillo, former College of Computing dean and director of the new Center for 21st Century Universities. <em>Source: Converge.com</em></p>]]></body>  <author>Mike Terrazas</author>  <status>1</status>  <created>1293030330</created>  <gmt_created>2010-12-22 15:05:30</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[StartProto]]></publication>  <article_dateline>2010-12-22T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-12-22T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-12-22T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.convergemag.com/policy/Center-for-21st-Century-Universities.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="6932"><![CDATA[educational research]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="63297">  <title><![CDATA[The Coming Wave of Augmented Reality]]></title>  <uid>27174</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>The software's ready. The hardware's ready. And now the infrastructure is preparing for an impending boom in AR applications. Blair MacIntyre (<em>Interactive Computing</em>), director of the Augmented Environments Lab, is ready to catch the wave (audio story). <em>Source: American Public Radio</em></p>]]></body>  <author>Mike Terrazas</author>  <status>1</status>  <created>1293104385</created>  <gmt_created>2010-12-23 11:39:45</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Kristen Mahaver]]></publication>  <article_dateline>2010-12-23T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-12-23T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-12-23T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://marketplace.publicradio.org/display/web/2010/12/22/tech-report-the-coming-wave-of-augmented-reality/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="1597"><![CDATA[Augmented Reality]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="63401">  <title><![CDATA[Teach Students To Compute For Good]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>"As an educator and a scientist, I believe we must foster the altruistic side of students and use computer science as a cutting-edge discipline to tackle real issues that affect all walks of life and from all corners of the globe," writes Santosh Vempala, Distinguished Professor in Computer Science, in an opinion essay about the College of Computing's "Computing for Good" initiative. <em>Source: AJC.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1294325482</created>  <gmt_created>2011-01-06 14:51:22</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Teach Students To Compute For Good]]></publication>  <article_dateline>2010-01-06T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-01-06T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-01-06T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.ajc.com/opinion/teach-students-to-compute-267899.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="63402">  <title><![CDATA[The Year in Robotics]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Andrea Thomaz, assistant professor in Interactive Computing, was named one of 2009's top young innovators by Technology Review for her work in creating robots with social skills, which can enable humans to teach the robots new information and skills through interaction rather than simply programming. <em>Source: TechnologyReview</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1294328687</created>  <gmt_created>2011-01-06 15:44:47</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Switched Inductor Power IC Design]]></publication>  <article_dateline>2010-01-14T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-01-14T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-01-14T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.technologyreview.com/computing/24231/?a=f]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="11526"><![CDATA[Andrea Thomaz]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="63403">  <title><![CDATA[Sampling Smiles In 206 Nations, 1 Year]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Coca-Cola's new social media campaign, "Open Happiness," dispatches "Happiness Ambassadors" around the world to everywhere Coke is sold, with the mission to document what makes people happy. The company's goal is to generate buzz in social media like Twitter and Facebook (and, in turn, sell more Coke). But Amy Bruckman, associate professor in Interactive Computing, wonders if happiness is enough of a hook to lure people in. <em>Source: AJC.com</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1294328802</created>  <gmt_created>2011-01-06 15:46:42</gmt_created>  <changed>1475893455</changed>  <gmt_changed>2016-10-08 02:24:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Sampling Smiles In 206 Nations, 1 Year]]></publication>  <article_dateline>2010-01-19T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-01-19T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-01-19T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.ajc.com/search/content/printedition/2010/01/17/happy01171.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="8472"><![CDATA[amy bruckman]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62868">  <title><![CDATA[Search Engine Bridges Language Barrier]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Steven Crain <em>(Computer Science)</em> talks about diaTM, a machine-learning model that learns the vernacular of the users and applies it to other more technical words to provide better search results for medical terminology. <br /></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1290183990</created>  <gmt_created>2010-11-19 16:26:30</gmt_created>  <changed>1475893452</changed>  <gmt_changed>2016-10-08 02:24:12</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Judith Priddy]]></publication>  <article_dateline>2010-11-18T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-11-18T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-11-18T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.mediapost.com/publications/?art_aid=139694&amp;fa=Articles.showArticle]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="9167"><![CDATA[machine learning]]></keyword>          <keyword tid="168883"><![CDATA[search engine optimization]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62876">  <title><![CDATA[Super Accurate Video Games]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Karen Liu (IC) explains how the new technology currently being worked on at Georgia Tech will change the way video gamers interact with their characters. Activate 3D allows you to use just your body movements to have total control over your character. (video story)&nbsp;</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1290185167</created>  <gmt_created>2010-11-19 16:46:07</gmt_created>  <changed>1475893452</changed>  <gmt_changed>2016-10-08 02:24:12</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[McMillan Street]]></publication>  <article_dateline>2010-11-01T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-11-01T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-11-01T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.cnn.com/video]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="3217"><![CDATA[video game]]></keyword>          <keyword tid="5875"><![CDATA[video game environments]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62877">  <title><![CDATA[OpenStudy. The Match.com of Student Study Help]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Ashwin Ram (IC), Preetha Ram, and Chris Sprague (CS) created OpenStudy, a social networking site that connects you to students studying the same subject as you that can help you study anytime you need it.&nbsp;</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1290185333</created>  <gmt_created>2010-11-19 16:48:53</gmt_created>  <changed>1475893452</changed>  <gmt_changed>2016-10-08 02:24:12</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Andrew McAvoy]]></publication>  <article_dateline>2010-11-01T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-11-01T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-11-01T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://thenextweb.com/apps/2010/10/28/openstudy-the-match-com-of-student-study-help/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10603"><![CDATA[collaborative learning]]></keyword>          <keyword tid="11113"><![CDATA[OpenStudy]]></keyword>          <keyword tid="167296"><![CDATA[social networking]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62878">  <title><![CDATA[Lose Weight and Stay Healthy with Usable Health]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Usable Health, co-founded by Jiten Chhabra (IC),&nbsp; is a program that can be customized to help you achieve your health goals, whether it's to lose weight, gain muscle, or just eat healthier.&nbsp;</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1290185488</created>  <gmt_created>2010-11-19 16:51:28</gmt_created>  <changed>1475893452</changed>  <gmt_changed>2016-10-08 02:24:12</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Andrew McAvoy]]></publication>  <article_dateline>2010-11-01T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-11-01T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-11-01T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://thenextweb.com/apps/2010/10/27/usable-health-make-better-food-choices-lose-weight-stay-healthy/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="398"><![CDATA[health]]></keyword>          <keyword tid="11112"><![CDATA[lose weight]]></keyword>          <keyword tid="11111"><![CDATA[usable health]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62530">  <title><![CDATA[Can Twitter Predict the Market?]]></title>  <uid>27174</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Based on a study he did at the University of Illinois, Eric Gilbert (Interactive Computing) says Twitter posts can serve as "something like a consumer confidence index for the digital age." <em>Source: SmartMoney</em></p>]]></body>  <author>Mike Terrazas</author>  <status>1</status>  <created>1288797603</created>  <gmt_created>2010-11-03 15:20:03</gmt_created>  <changed>1475893452</changed>  <gmt_changed>2016-10-08 02:24:12</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[behavioral sciences]]></publication>  <article_dateline>2010-11-03T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-11-03T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-11-03T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.smartmoney.com/investing/stocks/can-twitter-predict-the-market/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="167543"><![CDATA[social media]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62567">  <title><![CDATA[Showtime for OpenFlow at GENI advanced networking project event]]></title>  <uid>27154</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Nick Feamster and Russ Clark (both Computer Science) demonstrated limited release versions of NEC's ProgrammableFlow multilayer switches at the GENI Engineering Conference (GEC9) in Washington, D.C. <em>Source: Network World</em></p>]]></body>  <author>Louise Russo</author>  <status>1</status>  <created>1288958989</created>  <gmt_created>2010-11-05 12:09:49</gmt_created>  <changed>1475893452</changed>  <gmt_changed>2016-10-08 02:24:12</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[korean speech-quiz contest]]></publication>  <article_dateline>2010-11-05T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-11-05T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-11-05T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.networkworld.com/community/node/68221?hpg1=bn]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10637"><![CDATA[nick feamster]]></keyword>          <keyword tid="11167"><![CDATA[Russ Clark]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62873">  <title><![CDATA[Georgia Tech Security Summit Determines Primary Threats]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Mustaque Ahamad, director of Georgia Tech Information Security Center, comments on the security issues that are the three greatest threats according to the Emerging   Cyber Threats Report for 2011.<em></em></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1290184720</created>  <gmt_created>2010-11-19 16:38:40</gmt_created>  <changed>1475893452</changed>  <gmt_changed>2016-10-08 02:24:12</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[affect theory]]></publication>  <article_dateline>2010-11-08T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-11-08T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-11-08T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.processor.com/editorial/article.asp?article=articles%2Fp3223%2F43p23%2F163923.asp&amp;guid=A4480045B5154A73B68B74735C6E6AF0&amp;searchtype=&amp;WordList=&amp;bJumpTo=True]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="345"><![CDATA[cyber security]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62874">  <title><![CDATA[Phone Apps Aim to Fight Harassment]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Georgia Tech's doctoral candidate Jill Dimond (Human-Centered Computing) creates an Android application for Hollaback, a group that encourages women to report harassment immediately in order to alert others and help police find the offenders.&nbsp;</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1290184882</created>  <gmt_created>2010-11-19 16:41:22</gmt_created>  <changed>1475893452</changed>  <gmt_changed>2016-10-08 02:24:12</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Extension of Self]]></publication>  <article_dateline>2010-11-08T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-11-08T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-11-08T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.nytimes.com/2010/11/08/nyregion/08hollaback.html?_r=1&amp;ref=nyregion]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="4093"><![CDATA[harassment]]></keyword>          <keyword tid="168884"><![CDATA[smart phone applications]]></keyword>          <keyword tid="11195"><![CDATA[women&#039;s rights]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62872">  <title><![CDATA[DARPA Begins Funding Plans That Are To Lead To An Exaflop Supercomputer In 2018]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>David Bader (Comp Sci &amp; Eng) is working with NVIDIA Corp.&nbsp; and the Georgia Tech Research Institute to provide expertise to develop the next generation of extreme scale supercomputers.&nbsp;</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1290184619</created>  <gmt_created>2010-11-19 16:36:59</gmt_created>  <changed>1475893452</changed>  <gmt_changed>2016-10-08 02:24:12</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[ossoff]]></publication>  <article_dateline>2010-11-09T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-11-09T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-11-09T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://nextbigfuture.com/2010/11/darpa-begins-funding-plans-that-are-to.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50877"><![CDATA[School of Computational Science and Engineering]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="167325"><![CDATA[supercomputer]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62265">  <title><![CDATA[Augmented Reality Technology Fuses Physical &amp; Virtual]]></title>  <uid>27174</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Augmented reality apps don't need to stop at games or entertainment, says Blair MacIntyre (IC). “If you’re teaching physics," he says, "why not build a little interactive 3-D physics simulation?" <em>Source: San Diego Union-Tribune</em></p>]]></body>  <author>Mike Terrazas</author>  <status>1</status>  <created>1287497259</created>  <gmt_created>2010-10-19 14:07:39</gmt_created>  <changed>1475893452</changed>  <gmt_changed>2016-10-08 02:24:12</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Military Graduate Research Assistant]]></publication>  <article_dateline>2010-10-19T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-19T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-19T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.signonsandiego.com/news/2010/oct/18/technology-fuses-physical-and-virtual/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62871">  <title><![CDATA[Robot Musician Jams with Humans]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Shimon, a robotic musician created by Gil Weinberg (<em>Interactive Computing</em>), jams with human musicians at the USA Science and Engineering festival in Washington DC. (video story) </p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1290184324</created>  <gmt_created>2010-11-19 16:32:04</gmt_created>  <changed>1475893452</changed>  <gmt_changed>2016-10-08 02:24:12</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Robot Musician Jams with Humans]]></publication>  <article_dateline>2010-11-12T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-11-12T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-11-12T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.newscientist.com/blogs/nstv/2010/11/robot-musician-jams-with-humans.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="1180"><![CDATA[Music]]></keyword>          <keyword tid="1356"><![CDATA[robot]]></keyword>          <keyword tid="11252"><![CDATA[robotic human interaction]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62266">  <title><![CDATA[Bruckman Says Facebook Not Designed for Privacy]]></title>  <uid>27174</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Amy Bruckman (IC), a Farmville player herself, says removing your birthday from Facebook could prevent you from being an easy target for identity thieves (video). <em>Source: Fox 5 Atlanta</em></p>]]></body>  <author>Mike Terrazas</author>  <status>1</status>  <created>1287497333</created>  <gmt_created>2010-10-19 14:08:53</gmt_created>  <changed>1475893452</changed>  <gmt_changed>2016-10-08 02:24:12</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[GAANN Fellows]]></publication>  <article_dateline>2010-10-19T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-19T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-19T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.myfoxatlanta.com/dpp/news/facebook-says-apps-transmitted-user-information-101810]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="167543"><![CDATA[social media]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62870">  <title><![CDATA[The Deceitful Robot]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Time Magazine names Alan Wagner (<em>Interactive Computing</em>) and Ron Arkin's (<em>Interactive Computing</em>) deceptive robot one of the 50 best inventions of 2010.&nbsp;<em> </em></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1290184189</created>  <gmt_created>2010-11-19 16:29:49</gmt_created>  <changed>1475893452</changed>  <gmt_changed>2016-10-08 02:24:12</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[2023 U.S. News &amp; World Report Best Colleges]]></publication>  <article_dateline>2010-11-15T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-11-15T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-11-15T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.time.com/time/specials/packages/article/0,28804,2029497_2030615,00.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10604"><![CDATA[Deception]]></keyword>          <keyword tid="1356"><![CDATA[robot]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62267">  <title><![CDATA[Your Secrets Embedded in Smart Phone Pics]]></title>  <uid>27174</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Think twice before uploading that picture from your phone to Facebook, says Blair MacIntyre (IC). Because smartphone pics contain geotags, bad guys (the smart ones, at least) could use them to track down where you live. <em>Source: CBS Atlanta</em></p>]]></body>  <author>Mike Terrazas</author>  <status>1</status>  <created>1287497413</created>  <gmt_created>2010-10-19 14:10:13</gmt_created>  <changed>1475893452</changed>  <gmt_changed>2016-10-08 02:24:12</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Your Secrets Embedded in Smart Phone Pics]]></publication>  <article_dateline>2010-10-19T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-19T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-19T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.cbsatlanta.com/consumer/25432580/detail.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="2678"><![CDATA[information security]]></keyword>          <keyword tid="167543"><![CDATA[social media]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62869">  <title><![CDATA[University Researchers Develop New Technology To Trace Fraudulent Voice Calls]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Georgia Tech's Mustaque Ahamad (<em>Computer Science</em>) and Patrick Traynor (<em>Computer Science)</em> discuss PinDr0p, and how it's helping create a truly trustworthy caller ID.<em></em></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1290184094</created>  <gmt_created>2010-11-19 16:28:14</gmt_created>  <changed>1475893452</changed>  <gmt_changed>2016-10-08 02:24:12</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Career Educator]]></publication>  <article_dateline>2010-11-17T00:00:00-05:00</article_dateline>  <iso_article_dateline>2010-11-17T00:00:00-05:00</iso_article_dateline>  <gmt_article_dateline>2010-11-17T00:00:00-05:00</gmt_article_dateline>  <article_url><![CDATA[http://www.darkreading.com/vulnerability_management/security/client/showArticle.jhtml;jsessionid=OXI3SM0WFWHLHQE1GHPSKHWATMY32JVN?articleID=227700279]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="11291"><![CDATA[PinDr0p]]></keyword>          <keyword tid="11078"><![CDATA[telephone scammers]]></keyword>          <keyword tid="3197"><![CDATA[Voice Over Internet Protocal]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61417">  <title><![CDATA[Yevgeniy Medynskiy (IC) introduces Salud! an online application that can not only track calories, but also other things such as]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Georgia Tech's Mustaque Ahamad (CS) comments on the dangers ofbotnets and how it can be more effective to hunt them at the networklevel.&nbsp;</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1286217235</created>  <gmt_created>2010-10-04 18:33:55</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Would never be part of any organization that would have me as a member]]></publication>  <article_dateline>2010-10-04T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-04T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-04T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://gadgetwise.blogs.nytimes.com/2010/09/30/comcast-to-monitor-customer-computers-for-malware/?ei=5040&amp;partner=MOREOVERNEWS]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10838"><![CDATA[botnets]]></keyword>          <keyword tid="7772"><![CDATA[malware]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61005">  <title><![CDATA[6 Game Design Schools to Watch]]></title>  <uid>27174</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Even if the classes are hardcore technical, the College of Computing's Computational Media major is a program that will make you think outside the box when it comes to game design. <em>Source: GamePro.com</em></p>]]></body>  <author>Mike Terrazas</author>  <status>1</status>  <created>1284631247</created>  <gmt_created>2010-09-16 10:00:47</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Henry Stommel Award]]></publication>  <article_dateline>2010-09-16T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-16T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-16T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.gamepro.com/article/features/216448/6-game-design-schools-to-watch/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10013"><![CDATA[computational media]]></keyword>          <keyword tid="10658"><![CDATA[game design]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61495">  <title><![CDATA[GTRI Creates Cyber Technology and Information Security Laboratory]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Mustaque Ahamad (CS) discusses how GTISC is working together withGTRI to create cyber security solutions for real world problems.&nbsp;</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1286373931</created>  <gmt_created>2010-10-06 14:05:31</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[impacting the state]]></publication>  <article_dateline>2010-10-05T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-05T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-05T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.military-technologies.net/2010/10/04/gtri-creates-cyber-technology-and-information-security-laboratory/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="345"><![CDATA[cyber security]]></keyword>          <keyword tid="2254"><![CDATA[gtisc]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61006">  <title><![CDATA[Robots Taught How to Deceive]]></title>  <uid>27174</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>"We have been concerned from the very beginning with the ethical implications," says Ron Arkin (IC). "We strongly encourage discussion about the appropriateness of deceptive robots." <em>Source: Wired UK</em></p>]]></body>  <author>Mike Terrazas</author>  <status>1</status>  <created>1284631333</created>  <gmt_created>2010-09-16 10:02:13</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[tri-gate transistor]]></publication>  <article_dateline>2010-09-16T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-16T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-16T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.wired.co.uk/news/archive/2010-09/13/robots-taught-how-to-deceive]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="667"><![CDATA[robotics]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61496">  <title><![CDATA[Are Pencils a Thing of the Past?]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Teachers are incorporating the latest technology to educatestudents, among these; teachers are suggesting Georgia Tech's OpenStudyas a study resource that expands beyond the borders of their ownschools.<em></em></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1286374121</created>  <gmt_created>2010-10-06 14:08:41</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[early admit 2]]></publication>  <article_dateline>2010-10-05T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-05T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-05T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://liveshots.blogs.foxnews.com/2010/10/02/are-pencils-a-thing-of-the-past/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10603"><![CDATA[collaborative learning]]></keyword>          <keyword tid="167543"><![CDATA[social media]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61007">  <title><![CDATA[Glove Helps You Play Piano Like a Pro]]></title>  <uid>27174</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Thad Starner (IC) appears live on CNN to demonstrate his computerized glove that teaches wearers simple piano licks by delivering electrical impulses to the appropriate fingers to indicate which notes to play (video segment). <em>Source: CNN.com</em></p>]]></body>  <author>Mike Terrazas</author>  <status>1</status>  <created>1284631423</created>  <gmt_created>2010-09-16 10:03:43</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[McMillan Street]]></publication>  <article_dateline>2010-09-16T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-16T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-16T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.cnn.com/video/?/video/tech/2010/09/15/nr.big.i.music.touch.cnn]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="9766"><![CDATA[ubiquitous computing]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61497">  <title><![CDATA[Cable Provider Issues Bad Bot Alerts]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Comcast is sending out bot alerts to customers in an effort toreduce the malicious programs on their servers. The InformationSecurity Center at Georgia Tech estimates that the number of botinfected computers could be in the tens to hundreds of millions.</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1286374259</created>  <gmt_created>2010-10-06 14:10:59</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Anglel Cabrera]]></publication>  <article_dateline>2010-10-05T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-05T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-05T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.technewsdaily.com/cable-provider-issues-bad-bot-alerts-1366/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="9223"><![CDATA[computer security]]></keyword>          <keyword tid="7772"><![CDATA[malware]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61020">  <title><![CDATA[Lebanon Says Google Search Manipulation Not Surprising]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Guy Lebanon (CSE) says he's not surprised that an Atlanta PR firm's attempt to influence Google's search engine in connection with the state gubernatorial race was successful. Lebanon writes about the topic on his <a href="http://smlv.cc.gatech.edu/2010/09/16/google-instant-and-new-avenues-for-search-engine-optimization/">blog</a>. <em>Source: AJC.com</em></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1284647395</created>  <gmt_created>2010-09-16 14:29:55</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Lebanon Says Google Search Manipulation Not Surprising]]></publication>  <article_dateline>2010-09-16T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-16T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-16T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://blogs.ajc.com/political-insider-jim-galloway/2010/09/15/seth-persilys-private-war-on-nathan-deals-reputation/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50877"><![CDATA[School of Computational Science and Engineering]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="168879"><![CDATA[search engine]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62149">  <title><![CDATA[Smartphones, Twitter, Facebook Face Emerging Cyber Threats]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Discusses the new cyber threat report from the Georgia Tech Information Security Center (GTISC) and what it means to mobile and social network users.</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1287049472</created>  <gmt_created>2010-10-14 09:44:32</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[dancing in odessa]]></publication>  <article_dateline>2010-10-14T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-14T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-14T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://uk.ibtimes.com/articles/70126/20101008/smartphones-twitter-facebook-bing-google-social-networking-orkut-adobe-microsoft-windows-ios-android.htm]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10838"><![CDATA[botnets]]></keyword>          <keyword tid="345"><![CDATA[cyber security]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61021">  <title><![CDATA[Researchers Turn Home Electrical Wiring Into Antenna for Sensor]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>A joint Georgia Tech-University of Washington study, led by Gregory Abowd's (IC) former Ph.D. student Shwetak Patel, showed that residential wiring can be used to transmit information to and from almost anywhere else from within. <em>Source: International Business Times</em></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1284647548</created>  <gmt_created>2010-09-16 14:32:28</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[dancing in odessa]]></publication>  <article_dateline>2010-09-16T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-16T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-16T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.ibtimes.com/articles/62678/20100915/sensing-wireless-devices-electrical-wiring-innovation-university-of-washington-snupi.htm]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="9766"><![CDATA[ubiquitous computing]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62151">  <title><![CDATA[New Tool Blocks Downloads From Malicious Sites]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Wenke Lee (CS) describes how BLADE works by tracking how users interact with their browsers to distinguish downloads that were authorized versus downloads that were not. BLADE then stops and removes the downloads that were not authorized.</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1287050849</created>  <gmt_created>2010-10-14 10:07:29</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[snagit]]></publication>  <article_dateline>2010-10-14T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-14T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-14T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://it.slashdot.org/story/10/10/10/194215/New-Tool-Blocks-Downloads-From-Malicious-Sites?from=rss&amp;utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Slashdot%2FslashdotIt+%28Slashdot%3A+IT%29]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10867"><![CDATA[Blade]]></keyword>          <keyword tid="10863"><![CDATA[drive-by download]]></keyword>          <keyword tid="7772"><![CDATA[malware]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61022">  <title><![CDATA[To Text or Not to Text During Emergencies]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Texting during an emergency is similar to trying to enter an eight-lane superhighway from a one-lane dirt-road entrance ramp, says Patrick Traynor (CS). "The capacity to deliver that amount of critical messages to one confined area simply doesn't exist." <em>Source: NextGov.com</em> </p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1284647680</created>  <gmt_created>2010-09-16 14:34:40</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[To Text or Not to Text During Emergencies]]></publication>  <article_dateline>2010-09-16T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-16T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-16T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.nextgov.com/nextgov/ng_20100914_5986.php?oref=topnews]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="2317"><![CDATA[crisis communications]]></keyword>          <keyword tid="168880"><![CDATA[SMS capabilities]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62153">  <title><![CDATA[Drive-By Malware Blocked By New Tool]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Georgia Tech and SRI researchers explain how BLADE cuts off drive-by downloads at the one point they all have to pass through - downloading and executing a file on the computer. By identifying the malware at this juncture, BLADE can prevent the install and delete the program.</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1287051752</created>  <gmt_created>2010-10-14 10:22:32</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[road closures]]></publication>  <article_dateline>2010-10-14T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-14T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-14T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.informationweek.com/news/security/intrusion-prevention/showArticle.jhtml?articleID=227700415&amp;subSection=News]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10867"><![CDATA[Blade]]></keyword>          <keyword tid="10863"><![CDATA[drive-by download]]></keyword>          <keyword tid="7772"><![CDATA[malware]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61023">  <title><![CDATA[Fooled You! Robots Learn How to Deceive]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Deception could be an important tool in a battefield robot's arsenal, says a colleague of Ron Arkin's (IC) who helped develop algorithms that let robots determine whether to use deception against fellow robots or humans. <em>Source: Discovery News</em></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1284647866</created>  <gmt_created>2010-09-16 14:37:46</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Delta Jacket]]></publication>  <article_dateline>2010-09-16T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-16T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-16T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://news.discovery.com/tech/fooled-you-robots-learn-how-to-deceive.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="667"><![CDATA[robotics]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62155">  <title><![CDATA[Hidden Truths]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Collage, a system devised by Nick Feamster (CS) and his colleagues at Georgia Tech, hides messages in plain sight using sophisticated steganography.</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1287052758</created>  <gmt_created>2010-10-14 10:39:18</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[back-to-school]]></publication>  <article_dateline>2010-10-14T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-14T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-14T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.economist.com/node/17243251]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10970"><![CDATA[anti-censorship]]></keyword>          <keyword tid="10971"><![CDATA[hidden messages]]></keyword>          <keyword tid="168882"><![CDATA[steganography]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61040">  <title><![CDATA[The Gloved One: Tech Researchers Hone Fingertip Musicianship]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Thad Starner (IC) and graduate student Tanya Markow are making music with a glove that teaches you sooner through muscle memory. (Video Story) <em>Source: 11Alive</em><br /></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1284735459</created>  <gmt_created>2010-09-17 14:57:39</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[The Gloved One: Tech Researchers Hone Fingertip Musicianship]]></publication>  <article_dateline>2010-09-17T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-17T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-17T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://65.168.17.130/MVSavedClips/bd345f14-9b3e-48a8-be82-6a0d382c6fce.wmv]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="1180"><![CDATA[Music]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62157">  <title><![CDATA[Emerging Cyberthreats Outlined in New Report]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>The Georgia Tech Emerging Cyber Threats Report for 2011 states that there will be an increase in threats in three cyber security areas: physical systems, large-scale attacks by botnets, and mobile devices and social networking.</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1287053552</created>  <gmt_created>2010-10-14 10:52:32</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Emerging Cyberthreats Outlined in New Report]]></publication>  <article_dateline>2010-10-14T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-14T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-14T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.cio-today.com/story.xhtml?story_id=75523&amp;full_skip=1]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="345"><![CDATA[cyber security]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61071">  <title><![CDATA[Feamster Designs a Better Spam Trap]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>NIck Feamster's (CS) SNARE catches incoming spam not by reading message content, but by examining behavior of the sender, which requires much less computing power (radio interview). <em>Source: WTOP </em></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1284989533</created>  <gmt_created>2010-09-20 13:32:13</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[International Microelectronics Assembly and Packaging Society (IMAPS)]]></publication>  <article_dateline>2010-09-20T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-20T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-20T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.nae.edu/radio]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10674"><![CDATA[email filtering]]></keyword>          <keyword tid="10675"><![CDATA[network security]]></keyword>          <keyword tid="168881"><![CDATA[spam]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61251">  <title><![CDATA[Deceptive robots hint at machine self-awareness]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Alan Wagner (IC) and Ron Arkin (IC) aren't only proving that robots are capable of deceiving, they're proving that they can learn and reason about another entity. Begging the question: Can robots have theory of mind?&nbsp;</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1285597432</created>  <gmt_created>2010-09-27 14:23:52</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[effective stress management]]></publication>  <article_dateline>2010-09-27T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-27T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-27T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.newscientist.com/article/mg20727794.800-deceptive-robots-hint-at-machine-selfawareness.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10604"><![CDATA[Deception]]></keyword>          <keyword tid="2352"><![CDATA[robots]]></keyword>          <keyword tid="10753"><![CDATA[theory of mind]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62184">  <title><![CDATA[Nutrition? There’s An App For That]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Andrea Grimes Parker (IC) speaks about the new app OrderUP!- a casual nutrition decision game- created by her and other Georgia Tech researchers.</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1287067858</created>  <gmt_created>2010-10-14 14:50:58</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Elfriede Jelinek]]></publication>  <article_dateline>2010-10-14T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-14T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-14T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.ibtimes.com/articles/71202/20101012/mobile-apps-nutrition-healthy-living-georgia-tech.htm]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="2530"><![CDATA[application]]></keyword>          <keyword tid="398"><![CDATA[health]]></keyword>          <keyword tid="4131"><![CDATA[nutrition]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61370">  <title><![CDATA[Signing Made Easy]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Only 25% of children who are deaf have parents who are fluent in sign language. Georgia Tech's Thad Starner (IC) and his colleague Jeff Wilson (CS) have created video games and cell phone apps to help both parents and their children learn. (video story)&nbsp;</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1285856045</created>  <gmt_created>2010-09-30 14:14:05</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[ice shelf collapse]]></publication>  <article_dateline>2010-09-30T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-30T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-30T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.nsf.gov/news/special_reports/science_nation/index.jsp]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="3725"><![CDATA[children&#039;s learning]]></keyword>          <keyword tid="1754"><![CDATA[deaf]]></keyword>          <keyword tid="2483"><![CDATA[interactive computing]]></keyword>          <keyword tid="167327"><![CDATA[sign language]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="66164">  <title><![CDATA[Kraken Botnet Reemerges 318,000 Nodes Strong]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>The Kraken botnet reappeared in April and has returned to at least half the size it was during its peak in 2008, says Paul Royal of the Georgia Tech Information Security Center.<em>Source: SC Magazine</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1305212559</created>  <gmt_created>2011-05-12 15:02:39</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Research on Careers in Science Lab]]></publication>  <article_dateline>2010-06-30T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-06-30T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-06-30T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.scmagazineus.com/kraken-botnet-re-emerges-318000-nodes-strong/article/173611/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62214">  <title><![CDATA[Mini Unmanned Aircraft Team Up with Porsche Named Sting]]></title>  <uid>27174</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Sting, the Robotics &amp; Intelligent Machine (RIM) Center's Porsche Cayenne-turned-autonomous-robotic-SUV, teamed up with two unmanned aerial vehicles for an exercise at Robotics Rodeo 2010, held Oct. 12-15 at Georgia's Fort Benning. <em>Source: Scientific American</em><em></em></p>]]></body>  <author>Mike Terrazas</author>  <status>1</status>  <created>1287400985</created>  <gmt_created>2010-10-18 11:23:05</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[work family interactions]]></publication>  <article_dateline>2010-10-18T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-18T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-18T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.scientificamerican.com/blog/post.cfm?id=mini-unmanned-aircraft-embark-on-mi-2010-10-14]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="667"><![CDATA[robotics]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61372">  <title><![CDATA[More Join HP, Intel and Yahoo on Open Cirrus Cloud Test Bed]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Georgia Tech's Center for Experimental Research has joined Open Cirrus, the open source project for cloud computing research.<em></em></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1285857091</created>  <gmt_created>2010-09-30 14:31:31</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[misinformation]]></publication>  <article_dateline>2010-09-30T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-30T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-30T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.pcworld.com/businesscenter/article/206275/more_join_hp_intel_and_yahoo_on_open_cirrus_cloud_test_bed.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10807"><![CDATA[cloud computing]]></keyword>          <keyword tid="5155"><![CDATA[open source]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62218">  <title><![CDATA[Botnets Increasingly Threaten Networks, Warns Georgia Tech]]></title>  <uid>27174</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>More than 100 million computers worldwide have been infected by botnets, according to GTISC's Emerging Cyber Threats Report for 2011, but also on the rise are threats from USB devices and online app stores.<em> Source: InfoSecurity.com</em></p>]]></body>  <author>Mike Terrazas</author>  <status>1</status>  <created>1287401829</created>  <gmt_created>2010-10-18 11:37:09</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[(IV) therapy]]></publication>  <article_dateline>2010-10-18T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-18T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-18T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.infosecurity-us.com/view/13226/botnets-increasingly-threaten-computers-and-networks-warns-georgia-tech/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10567"><![CDATA[Georgia Tech Information Security Center]]></keyword>          <keyword tid="2678"><![CDATA[information security]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61373">  <title><![CDATA[Cloud Computing Test Bed Open Cirrus Announces Expansion]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Open Cirrus- a global, multiple data center, and open source test bed - is expanding, and Georgia Tech's Center for Experimental Research in Computer Systems (CERCS) is part of that expansion. CERCS will add tools and best practices that will further enable the advancement of cloud computing research.&nbsp;</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1285857213</created>  <gmt_created>2010-09-30 14:33:33</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Graph Neural Networks]]></publication>  <article_dateline>2010-09-30T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-30T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-30T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://it.tmcnet.com/channels/cloud-computing/articles/104960-cloud-computing-test-bed-open-cirrus-announces-expansion.htm]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10807"><![CDATA[cloud computing]]></keyword>          <keyword tid="5155"><![CDATA[open source]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="62228">  <title><![CDATA[OpenStudy, MITCourseWare to Help OCW Users Study Together]]></title>  <uid>27174</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>What do Intro to Computer Science, Single Variable Calculus and Chinese I have in common? They're the first three courses on MIT OpenCourseware to offer virtual study groups via OpenStudy, a joint Georgia Tech-Emory startup co-founded by Ashwin Ram (IC). <em>Source: ReadWriteWeb</em></p>]]></body>  <author>Mike Terrazas</author>  <status>1</status>  <created>1287412943</created>  <gmt_created>2010-10-18 14:42:23</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Andson Biotech]]></publication>  <article_dateline>2010-10-18T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-18T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-18T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.readwriteweb.com/archives/openstudy_teams_up_with_mit_opencourseware_to_help.php]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10603"><![CDATA[collaborative learning]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61374">  <title><![CDATA[Only a Quarter of Parents to Deaf Kids Know Sign Language]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Thad Starner (IC) is helping change the statistics by creating programs that help both deaf children and their parents. CopyCat is a video game that helps the children learn sign language, and SmartSign is a phone app that reminds parents how to sign words when they forget.&nbsp;<em></em></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1285857422</created>  <gmt_created>2010-09-30 14:37:02</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Lydia Kenney]]></publication>  <article_dateline>2010-09-30T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-30T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-30T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://news.softpedia.com/news/Only-a-Quarter-of-Parents-to-Deaf-Kids-Know-Sign-Language-158192.shtml]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="5157"><![CDATA[applications]]></keyword>          <keyword tid="3725"><![CDATA[children&#039;s learning]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61375">  <title><![CDATA[OpenStudy Harnesses the Power of Social Media]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Created by Ashwin Ram (IC) and his colleagues, OpenStudy is a website that is encouraging students to log on and study with students from anywhere at anytime.&nbsp;<em></em></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1285857597</created>  <gmt_created>2010-09-30 14:39:57</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Kathryn E Oliver]]></publication>  <article_dateline>2010-09-30T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-30T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-30T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://chimes.biola.edu/content/article/2010/sep/26/openstudy-social-media-academics/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10603"><![CDATA[collaborative learning]]></keyword>          <keyword tid="167543"><![CDATA[social media]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61416">  <title><![CDATA[Track Your Diet, Exercise on Web]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Yevgeniy Medynskiy (IC) introduces Salud! an online application thatcan not only track calories, but also other things such as proteinintake or exercise performed. (video story)&nbsp;</p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1286216985</created>  <gmt_created>2010-10-04 18:29:45</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[McMillan Street]]></publication>  <article_dateline>2010-10-04T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-10-04T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-10-04T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.cnn.com/video/data/2.0/video/living/2010/09/30/nr.velshi.tracking.food.exercise.cnn.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="5157"><![CDATA[applications]]></keyword>          <keyword tid="6063"><![CDATA[diet]]></keyword>          <keyword tid="398"><![CDATA[health]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="61019">  <title><![CDATA[Google, Georgia Tech Develop Video Screen &#039;Retargeting&#039;]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Working with Google scientists, Irfan Essa (IC) and Ph.D. candidate Matthias Grundmann have developed an algorithm that can alter the aspect ratio of video images with negligible distortion or image loss. <em>Source: InformationWeek</em><br /></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1284646834</created>  <gmt_created>2010-09-16 14:20:34</gmt_created>  <changed>1475893449</changed>  <gmt_changed>2016-10-08 02:24:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[road closures]]></publication>  <article_dateline>2010-09-15T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-15T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-15T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.informationweek.com/news/infrastructure/traffic_management/showArticle.jhtml?articleID=227400397&amp;subSection=News]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="124"><![CDATA[Digital Media]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="60539">  <title><![CDATA[NVIDIA Names Georgia Tech a CUDA Center of Excellence]]></title>  <uid>27262</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Jeffrey Vetter (CSE) will serve asprincipal investigator of the center that looks to leverage Georgia Tech research involving the company's GPU across a range of application areas. </p>]]></body>  <author>Fletcher Moore</author>  <status>1</status>  <created>1282575542</created>  <gmt_created>2010-08-23 14:59:02</gmt_created>  <changed>1475893446</changed>  <gmt_changed>2016-10-08 02:24:06</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[CCRF]]></publication>  <article_dateline>2010-08-23T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-08-23T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-08-23T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://pressroom.nvidia.com/easyir/customrel.do?easyirid=A0D622CE9F579F09&amp;prid=654285&amp;releasejsp=release_157&amp;version=live]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="60875">  <title><![CDATA[Start-Up Aspires to Make the World &#039;One Big Study Group&#039;]]></title>  <uid>27174</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Ashwin Ram's (IC) startup OpenStudy helps users build their own personal study networks; when they have a question, the site pushes it out to their extended network. Three thousand users have joined in OpenStudy's first week.</p>]]></body>  <author>Mike Terrazas</author>  <status>1</status>  <created>1284025755</created>  <gmt_created>2010-09-09 09:49:15</gmt_created>  <changed>1475893446</changed>  <gmt_changed>2016-10-08 02:24:06</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[You in The News]]></publication>  <article_dateline>2010-09-09T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-09T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-09T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://chronicle.com/blogPost/Start-Up-Aspires-to-Make-the/26780/?sid=wc&amp;utm_source=wc&amp;utm_medium=en]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10603"><![CDATA[collaborative learning]]></keyword>          <keyword tid="167296"><![CDATA[social networking]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="60962">  <title><![CDATA[Robots Programmed to Deceive]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Geogia Tech scientist Ronald Arkin (IC) and his team have conducted experiments in robot deception for applications in which the ability to deceive could prove useful for military or search &amp; rescue robots. <em>Source: UPI</em></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1284463078</created>  <gmt_created>2010-09-14 11:17:58</gmt_created>  <changed>1475893446</changed>  <gmt_changed>2016-10-08 02:24:06</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[$65 million grant]]></publication>  <article_dateline>2010-09-09T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-09T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-09T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.upi.com/Science_News/2010/09/09/UPI-NewsTrack-Health-and-Science-News/UPI-60931284071246/?pvn=1]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="10606"><![CDATA[Military Operations]]></keyword>          <keyword tid="2352"><![CDATA[robots]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="60963">  <title><![CDATA[Military Research Teaches Robots how to Deceive Each Other]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Can algorithms based in interdependence theory and game theory allow a robot to deceive humans? Ron Arkin (IC) and colleagues are trying to find out. <em>Source: Popular Science</em></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1284463194</created>  <gmt_created>2010-09-14 11:19:54</gmt_created>  <changed>1475893446</changed>  <gmt_changed>2016-10-08 02:24:06</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[VLSI symposium]]></publication>  <article_dateline>2010-09-09T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-09T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-09T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.popsci.com/technology/article/2010-09/deceptive-robots-learn-when-and-how-pull-fast-one]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="8438"><![CDATA[algorithmic_game_theory]]></keyword>          <keyword tid="10606"><![CDATA[Military Operations]]></keyword>          <keyword tid="2352"><![CDATA[robots]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="60964">  <title><![CDATA[Qualcomm Demos Augmented Reality Apps]]></title>  <uid>27166</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Blair MacIntyre (IC) is working with Qualcomm to create augmented reality (AR) vision-based platforms in the AR gaming studios at Georgia Tech. <em>Source: ZDNET</em></p>]]></body>  <author>Juliet Helms</author>  <status>1</status>  <created>1284463273</created>  <gmt_created>2010-09-14 11:21:13</gmt_created>  <changed>1475893446</changed>  <gmt_changed>2016-10-08 02:24:06</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Rui Zhang]]></publication>  <article_dateline>2010-09-09T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-09-09T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-09-09T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.zdnet.co.uk/news/mobile-apps/2010/09/09/qualcomm-demos-augmented-reality-apps-40090049/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="1597"><![CDATA[Augmented Reality]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="66161">  <title><![CDATA[GPU Computing II: Where the Truth Lies]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>As the CPU vs. GPU wars heat up, research by Rich Vuduc (CSE) and colleagues shows the latter may not have quite the performance advantage some have said it does.&nbsp;<em>Source: HPCwire</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1305211752</created>  <gmt_created>2011-05-12 14:49:12</gmt_created>  <changed>1475893443</changed>  <gmt_changed>2016-10-08 02:24:03</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[Brett Aiello]]></publication>  <article_dateline>2010-06-25T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-06-25T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-06-25T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.hpcwire.com/blogs/GPU-Computing-II-Where-the-Truth-Lies-97117894.html]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="66165">  <title><![CDATA[Notorious Kraken Botnet Rises From the Ashes]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Call it the Son of Kraken, as the "zombie network" believed by some to be the largest in history has returned to nearly half its peak strength of 2008, says Paul Royal of GTISC.<em>Source: The Register</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1305212824</created>  <gmt_created>2011-05-12 15:07:04</gmt_created>  <changed>1475893440</changed>  <gmt_changed>2016-10-08 02:24:00</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[yearlong program]]></publication>  <article_dateline>2010-07-01T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-07-01T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-07-01T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.theregister.co.uk/2010/06/29/kraken_botnet_resurgence/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="2678"><![CDATA[information security]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="66163">  <title><![CDATA[Working Toward a Smarter, Faster Cloud]]></title>  <uid>27345</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Grad student Vytautas Valancius (CS) shows how cloud computing platforms can be optimized with custom data paths for applications with varying bandwidth demands.<em>Source: Technology Review</em></p>]]></body>  <author>Cristina Gonzalez</author>  <status>1</status>  <created>1305212092</created>  <gmt_created>2011-05-12 14:54:52</gmt_created>  <changed>1475893429</changed>  <gmt_changed>2016-10-08 02:23:49</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[CREST D-Map]]></publication>  <article_dateline>2010-06-25T00:00:00-04:00</article_dateline>  <iso_article_dateline>2010-06-25T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2010-06-25T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.technologyreview.com/web/25658/]]></article_url>  <media>      </media>  <hg_media>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node></nodes>